Vulnerability Details : CVE-2023-41444
An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attacker to execute arbitrary code and escalate privileges via the fun_1400084d0 function in IREC.sys driver.
Vulnerability category: Execute code
Products affected by CVE-2023-41444
- cpe:2.3:a:binalyze:irec:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-41444
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41444
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2023-41444
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-41444
-
https://github.com/magicsword-io/LOLDrivers/blob/main/yaml/d74fdf19-b4b0-4ec2-9c29-4213b064138b.yml
LOLDrivers/yaml/d74fdf19-b4b0-4ec2-9c29-4213b064138b.yml at main · magicsword-io/LOLDrivers · GitHubExploit;Product
-
https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0
CVE-2023-41444 - IREC.sys Vulnerability · GitHubExploit;Third Party Advisory
-
https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945
Windows Driver Exploit Development — irec.sys [CVE-2023–41444] | by Tyler Booth (dru1d) | Aug, 2023 | dru1dExploit;Third Party Advisory
Jump to