Cyber Posture

CVE-2024-55412

High

Published: 07 January 2025

Published
07 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.

Security Summary

CVE-2024-55412 is a vulnerability in the snxpsamd.sys driver within SUNIX Serial Driver x64 version 10.1.0.0. It enables low-privileged users to read and write arbitrary I/O ports through specially crafted IOCTL requests. The issue, published on 2025-01-07, carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-787.

Low-privileged local attackers can exploit this vulnerability to achieve privilege escalation, execute code under high privileges, and perform information disclosure. As a signed driver, it can also bypass Microsoft's driver-signing policy, facilitating the deployment of malicious code.

Details on the vulnerability, including potential exploitation techniques, are available in the GitHub repository at https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55412/CVE-2024-55412_snxpsamd.sys_README.md. The vendor website is at https://www.sunix.com/tw/.

Details

CWE(s)
CWE-787

References