CPUID CPU-Z before version 1.43 is vulnerable to an arbitrary memory write exploit that allows unauthorized programs to escalate privileges by making a specific call to the kernel-mode driver.
CPUID CPU-Z before version 1.43 is vulnerable to an arbitrary memory write exploit that allows unauthorized programs to escalate privileges by making a specific call to the kernel-mode driver.
Understanding CVE-2017-15303
Prior to version 1.43 of CPUID CPU-Z, a potential vulnerability exists where an unauthorized program executing on the same machine as CPU-Z can exploit an arbitrary memory write. This exploit allows for the direct escalation of privileges by making an ioctl 0x9C402430 call to the kernel-mode driver, such as cpuz141_x64.sys for version 1.41.
What is CVE-2017-15303?
In CPUID CPU-Z before 1.43, there is an arbitrary memory write that results directly in elevation of privileges, because any program running on the local machine (while CPU-Z is running) can issue an ioctl 0x9C402430 call to the kernel-mode driver (e.g., cpuz141_x64.sys for version 1.41).
The Impact of CVE-2017-15303
Technical Details of CVE-2017-15303
CPUID CPU-Z version 1.43 vulnerability details:
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take:
Long-Term Security Practices:
Patching and Updates: