A vulnerability exits in driver snxpsamd.sys in SUNIX...
High severity
Unreviewed
Published
Jan 7, 2025
to the GitHub Advisory Database
•
Updated Jan 8, 2025
Description
Published by the National Vulnerability Database
Jan 7, 2025
Published to the GitHub Advisory Database
Jan 7, 2025
Last updated
Jan 8, 2025
A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
References