CVE-2024-55412
Published: 07 January 2025
Description
A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
Security Summary
CVE-2024-55412 is a vulnerability in the snxpsamd.sys driver within SUNIX Serial Driver x64 version 10.1.0.0. It enables low-privileged users to read and write arbitrary I/O ports through specially crafted IOCTL requests. The issue, published on 2025-01-07, carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-787.
Low-privileged local attackers can exploit this vulnerability to achieve privilege escalation, execute code under high privileges, and perform information disclosure. As a signed driver, it can also bypass Microsoft's driver-signing policy, facilitating the deployment of malicious code.
Details on the vulnerability, including potential exploitation techniques, are available in the GitHub repository at https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55412/CVE-2024-55412_snxpsamd.sys_README.md. The vendor website is at https://www.sunix.com/tw/.
Details
- CWE(s)