The GLCKIo low-level driver in ASUS Aura Sync v1.07.22 and earlier exposes a path to write an arbitrary DWORD to an arbitrary address.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Dec/34 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/106250 | Third Party Advisory VDB Entry |
https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Dec/34 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/106250 | Third Party Advisory VDB Entry |
https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2018/Dec/34 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/106250 - Third Party Advisory, VDB Entry | |
References | () https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities - Exploit, Third Party Advisory |
Information
Published : 2018-12-26 21:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18537
Mitre link : CVE-2018-18537
CVE.ORG link : CVE-2018-18537
JSON object : View
Products Affected
asus
- aura_sync_firmware
- aura_sync
CWE