var-201911-0635
Vulnerability from variot
The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection. Patriot Viper RGB Contains a privilege management vulnerability.Information may be obtained and information may be altered. Patriot Viper RGB is a memory module device of Patriot company in Taiwan, China. A local attacker can use this vulnerability to perform read and write operations on memory at any location, thereby gaining NT AUTHORITYSYSTEM permissions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-0635", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "viper rgb", "scope": "eq", "trust": 1.0, "vendor": "patriotmemory", "version": "1.0" }, { "model": "viper rgb", "scope": "lt", "trust": 0.8, "vendor": "patriot memory", "version": "1.1" }, { "model": "viper rgb", "scope": "lt", "trust": 0.6, "vendor": "patriot", "version": "1.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41649" }, { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "NVD", "id": "CVE-2019-18845" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:patriotmemory:viper_rgb_firmware:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:patriotmemory:viper_rgb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18845" } ] }, "cve": "CVE-2019-18845", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18845", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-41649", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18845", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18845", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-41649", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201911-492", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-18845", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41649" }, { "db": "VULMON", "id": "CVE-2019-18845" }, { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "NVD", "id": "CVE-2019-18845" }, { "db": "CNNVD", "id": "CNNVD-201911-492" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\\SYSTEM privileges, by mapping \\Device\\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection. Patriot Viper RGB Contains a privilege management vulnerability.Information may be obtained and information may be altered. Patriot Viper RGB is a memory module device of Patriot company in Taiwan, China. A local attacker can use this vulnerability to perform read and write operations on memory at any location, thereby gaining NT AUTHORITYSYSTEM permissions", "sources": [ { "db": "NVD", "id": "CVE-2019-18845" }, { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "CNVD", "id": "CNVD-2019-41649" }, { "db": "CNNVD", "id": "CNNVD-201911-492" }, { "db": "VULMON", "id": "CVE-2019-18845" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18845", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-011729", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-41649", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-492", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-18845", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41649" }, { "db": "VULMON", "id": "CVE-2019-18845" }, { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "NVD", "id": "CVE-2019-18845" }, { "db": "CNNVD", "id": "CNNVD-201911-492" } ] }, "id": "VAR-201911-0635", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-41649" } ], "trust": 1.07619048 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41649" } ] }, "last_update_date": "2023-12-18T13:13:12.571000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.patriotmemory.com/" }, { "title": "Patch for Patriot Viper RGB Local Privilege Escalation Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/191419" }, { "title": "Patriot Viper RGB Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=102025" }, { "title": "Sharp-Suite", "trust": 0.1, "url": "https://github.com/fuzzysecurity/sharp-suite " }, { "title": "KDU", "trust": 0.1, "url": "https://github.com/hfiref0x/kdu " }, { "title": "WindowsExploitationResources", "trust": 0.1, "url": "https://github.com/fullshade/windowsexploitationresources " }, { "title": "windows-privilage-escalation", "trust": 0.1, "url": "https://github.com/onlinepetersteve/windows-privilage-escalation " }, { "title": "exploit", "trust": 0.1, "url": "https://github.com/ondrik8/exploit " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41649" }, { "db": "VULMON", "id": "CVE-2019-18845" }, { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "CNNVD", "id": "CNNVD-201911-492" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "NVD", "id": "CVE-2019-18845" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://github.com/active-labs/advisories/blob/master/active-2019-012.md" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18845" }, { "trust": 1.7, "url": "https://github.com/active-labs/advisories/blob/master/2019/active-2019-012.md" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18845" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://github.com/fuzzysecurity/sharp-suite" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/171275" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41649" }, { "db": "VULMON", "id": "CVE-2019-18845" }, { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "NVD", "id": "CVE-2019-18845" }, { "db": "CNNVD", "id": "CNNVD-201911-492" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-41649" }, { "db": "VULMON", "id": "CVE-2019-18845" }, { "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "db": "NVD", "id": "CVE-2019-18845" }, { "db": "CNNVD", "id": "CNNVD-201911-492" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41649" }, { "date": "2019-11-09T00:00:00", "db": "VULMON", "id": "CVE-2019-18845" }, { "date": "2019-11-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "date": "2019-11-09T18:15:10.950000", "db": "NVD", "id": "CVE-2019-18845" }, { "date": "2019-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-492" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41649" }, { "date": "2020-03-18T00:00:00", "db": "VULMON", "id": "CVE-2019-18845" }, { "date": "2019-11-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011729" }, { "date": "2020-03-18T19:15:16.717000", "db": "NVD", "id": "CVE-2019-18845" }, { "date": "2020-03-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-492" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-492" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Patriot Viper RGB Vulnerability in Permission Management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011729" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-492" } ], "trust": 0.6 } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.