Vulnerability Details : CVE-2023-35841
Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.This issue affects WinFlash Driver: before 4.5.0.0.
Vulnerability category: Gain privilege
Products affected by CVE-2023-35841
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-35841
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 16 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-35841
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Phoenix Technologies, Inc. | 2024-05-14 |
CWE ids for CVE-2023-35841
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: 22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de (Secondary)
-
The product implements an IOCTL with functionality that should be restricted, but it does not properly enforce access control for the IOCTL.Assigned by: 22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de (Secondary)
References for CVE-2023-35841
-
https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html
Hunting Vulnerable Kernel Drivers - VMware Security Blog - VMware
-
https://jvn.jp/en/vu/JVNVU93886750/index.html
JVNVU#93886750: Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL
-
https://www.phoenix.com/security-notifications/cve-2023-35841/
Phoenix Technologies Windows Driver Vulnerability - Phoenix Technologies - Leading PC Innovation since 1979
Jump to