Lucene search

K
attackerkbAttackerKBAKB:1D147668-E542-4997-AED2-31E07B5AF229
HistoryAug 02, 2017 - 12:00 a.m.

CVE-2017-9769

2017-08-0200:00:00
attackerkb.com
19

EPSS

0.232

Percentile

96.6%

A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing a handle to be opened to an arbitrary process.

Recent assessments:

zeroSteiner at November 21, 2019 11:14pm UTC reported:

Analysis

The Razer rzpnk.sys driver exposes a device \\.\47CD78C9-64C3-47C2-B80F-677B887CF095 which can be used to open an handle to an arbitrary process from any user. A user needs to open a handle to this device and issue NtDeviceIoControlFile using the IOCTL 0x22a050 to trigger the vulnerable code path. The buffer to be passed to the process is the target PID to open and 0 packed as two QWORD values (buffer = [pid, 0].pack('QQ'). This ultimately leads to a call to ZwOpenProcess which does not perform as many security checks as NtOpenProcess, thus allowing a user to open a handle to an arbitrary process.

To gain code execution from this vulnerability, the user32!LockWindowStatoin function can be hooked within the winlogon process. This process and function are ideal targets because winlogon runs as NT_AUTHORITY\SYSTEM and the function can be triggered on demand. As a by product of exploiting this, the screen will be locked, which may tip off an observant user who is interacting with the system at the time of exploitation.

Exploitation of this vulnerability is quite reliable as it does not rely on memory corruption.

References

Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 5

EPSS

0.232

Percentile

96.6%

Related for AKB:1D147668-E542-4997-AED2-31E07B5AF229