Attacker Value
Low
(1 user assessed)
Exploitability
High
(1 user assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

Two kernel-mode type-confusion / memory-corruption vulnerabilities in win32k!xxxRemoteReconnect

Last updated February 13, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The Windows Kernel is subject to two related kernel-mode type-confusion vulnerabilities inside win32k!xxxRemoteReconnect. In both cases, a user-mode parameter passed to the syscall is incorrectly resolved to its underlying kernel representation via ObReferenceObjectByHandle passing NULL as the “ObType” field (rather than *IoFileTypeObject and *IoDeviceTypeObject respectively).

Add Assessment

0
Ratings
  • Attacker Value
    Low
  • Exploitability
    High
Technical Analysis

Allows Admin to load unsigned driver, but that is already possible other ways.

General Information

Additional Info

Technical Analysis