An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attacker to execute arbitrary code and escalate privileges via the fun_1400084d0 function in IREC.sys driver.
References
Link | Resource |
---|---|
https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 | Exploit Third Party Advisory |
https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 | Exploit Third Party Advisory |
https://github.com/magicsword-io/LOLDrivers/blob/main/yaml/d74fdf19-b4b0-4ec2-9c29-4213b064138b.yml | Exploit Product |
https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 | Exploit Third Party Advisory |
https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 | Exploit Third Party Advisory |
https://github.com/magicsword-io/LOLDrivers/blob/main/yaml/d74fdf19-b4b0-4ec2-9c29-4213b064138b.yml | Exploit Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 - Exploit, Third Party Advisory | |
References | () https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 - Exploit, Third Party Advisory | |
References | () https://github.com/magicsword-io/LOLDrivers/blob/main/yaml/d74fdf19-b4b0-4ec2-9c29-4213b064138b.yml - Exploit, Product |
23 Sep 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-28 03:15
Updated : 2024-11-21 08:21
NVD link : CVE-2023-41444
Mitre link : CVE-2023-41444
CVE.ORG link : CVE-2023-41444
JSON object : View
Products Affected
binalyze
- irec
microsoft
- windows
CWE