Vulnerability Details : CVE-2019-17603
Potential exploit
Ene.sys in Asus Aura Sync through 1.07.71 does not properly validate input to IOCTL 0x80102044, 0x80102050, and 0x80102054, which allows local users to cause a denial of service (system crash) or gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2019-17603
- cpe:2.3:a:asus:aura_sync:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-17603
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-17603
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2019-17603
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-17603
-
https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/
ASUS Aura Sync: Stack-Based Buffer Overflow :: 0day — Pwned since MMXVIExploit;Third Party Advisory
-
http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html
ASUS Aura Sync 1.07.71 Privilege Escalation ≈ Packet Storm
Jump to