MSI Afterburner - ACL Bypass
7.8
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
MSI Afterburner v4.6.6.16381 Beta 3 - ACL Bypass
Code name
State
Public
Release date
May 17, 2024
Affected product
MSI Afterburner
Vendor
Micro-Star INT'L CO.
Affected version(s)
Version 4.6.6.16381 Beta 3
Vulnerability name
ACL Bypass
Vulnerability type
Remotely exploitable
No
CVSS v3.0 vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 base score
7.8
Exploit available
Yes
CVE ID(s)
Description
MSI Afterburner v4.6.6.16381 Beta 3 is vulnerable to an ACL Bypass vulnerability in the RTCore64.sys
driver, which leads to triggering vulnerabilities like CVE-2024-1443 and CVE-2024-1460 from a low privileged user.
Vulnerability
The RTCore64.sys
driver allows to perform any IOCTL operation from a low privileged user.
The creation of the DeviceObject
is done using the following code:
According to MSDN, the function signature is:
The defined SDDL string limits the access for the DeviceObject
to Administrators only:
Every DeviceObject
has an associated name space, which means that paths like \Device\DeviceName
and \Device\DeviceName\Anything
would be valid targets for a IOCTL request. However, as the DeviceCharacteristics
option is set to NULL
when creating the DeviceObject
, the defined ACL does not propagate to every possible file under the DeviceObject
namespace, making it trivial to bypass the ACL by simply adding a \
in the end of the DeviceName
definition in the IOCTL request:
Our security policy
We have reserved the ID CVE-2024-3745 to refer to this issue from now on.
System Information
Version: MSI Afterburner v4.6.6.16381 Beta 3
Operating System: Windows
Mitigation
The vendor published a the version 4.6.6 Beta 4 Build 16449 fixing this vulnerability:
References
Timeline
Vulnerability discovered
Apr 11, 2024
Vendor Confirmed Vuln.
Apr 13, 2024
Vulnerability patched
May 17, 2024
Vendor contacted
Apr 11, 2024
Vendor replied
Apr 13, 2024
Public disclosure
May 17, 2024