[Japanese]

JVNDB-2023-003028

Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL

Overview

Some of the Windows kernel drivers provided by Phoenix Technologies Inc. is vulnerable to insufficient access control on its IOCTL (CWE-782, CVE-2023-35841).

Takahiro Haruyama of VMware reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 3.3 (Low) [Other]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
Affected Products

This vulnerability was found in the driver file "TdkLib64.sys" by the reporter.

Phoenix Technologies Inc.
  • TdkLib64.sys

According to the developer, a patched driver was provided to the users who may be affected by this vulnerability in June 2023.
For more details, contact the developer.
Impact

By sending a specific IOCTL request, an attacker without the administrator privilege for the product may perform I/O to any hardware port or physical address, resulting in erasing or altering of the firmware.
Solution

[Contact the developer]
According to the developer, a patched driver was provided to the users who may be affected by this vulnerability in June 2023.

For more details, contact the developer.
Vendor Information

Phoenix Technologies Inc.
CWE (What is CWE?)

  1. Exposed IOCTL with Insufficient Access Control(CWE-782) [Other]
CVE (What is CVE?)

  1. CVE-2023-35841
References

  1. JVN : JVNVU#93886750
  2. JVN : JVNTA#90371415
Revision History

  • [2023/08/30]
      Web page was published
  • [2024/04/24]
      References : Content was added