← Back to CVEs
CVE-2020-12138
HIGH8.8
Description
AMD ATI atillk64.sys 5.11.9.0 allows low-privileged users to interact directly with physical memory by calling one of several driver routines that map physical memory into the virtual address space of the calling process. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges via a DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published4/27/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
amd:atillk64
Weaknesses (CWE)
CWE-862
References
https://eclypsium.com/2019/11/12/mother-of-all-drivers/(cve@mitre.org)
https://h0mbre.github.io/atillk64_exploit/(cve@mitre.org)
https://eclypsium.com/2019/11/12/mother-of-all-drivers/(af854a3a-2127-422b-91ae-364da2661108)
https://h0mbre.github.io/atillk64_exploit/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.