The MsIo64.sys component in Asus Aura Sync through v1.07.79 does not properly validate input to IOCTL 0x80102040, 0x80102044, 0x80102050, and 0x80102054, allowing attackers to trigger a memory corruption and cause a Denial of Service (DoS) or escalate privileges via crafted IOCTL requests.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html | |
https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/ | Exploit Technical Description Third Party Advisory |
https://www.asus.com/campaign/aura/us/download.php | Product Vendor Advisory |
https://www.asus.com/content/ASUS-Product-Security-Advisory/ | Vendor Advisory |
Configurations
History
16 Dec 2022, 20:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-14 15:15
Updated : 2024-02-05 15:02
NVD link : CVE-2022-44898
Mitre link : CVE-2022-44898
CVE.ORG link : CVE-2022-44898
JSON object : View
Products Affected
asus
- aura_sync
CWE
CWE-787
Out-of-bounds Write