Vulnerability CVE-2019-16098


Published: 2019-09-11

Description:
The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
MSI RTCore64.sys Privilege escalation
NSA
07.10.2024

Type:

CWE-269

(Improper Privilege Management)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
MSI -> Afterburner 

 References:
https://github.com/Barakat/CVE-2019-16098

Copyright 2024, cxsecurity.com

 

Back to Top