- Description
- Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD with a parallel thread changing the memory’s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the userspace to change page permissions half way through the routine. A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations.
- Source
- cve@rapid7.com
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 7.3
- Impact score
- 5.3
- Exploitability score
- 1.5
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
- Severity
- HIGH
- cve@rapid7.com
- CWE-20
- Hype score
- Not currently trending
CVE-2024-10972 (CVSS:7.3, HIGH) is Awaiting Analysis. Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with..https://t.co/wXleJtmxUF #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
21 Dec 2024
21 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10972 (Published: 2024-12-16) - High severity vulnerability in Velocidex WinPmem. Affects versions prior to v4.1.dev1. 🛠️ Remediation: Upgrade to the latest release at https://t.co/SIpXTSaZvs to secure your systems! #CyberSecurity #VulnerabilityAlert
@transilienceai
19 Dec 2024
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10972 Velocidex WinPmem versions below 4.1 suffer from an Improper Input Validation vulnerability whereby an attacker can directly communicate with the driver by accessing … https://t.co/JY6Wo4oPjN
@CVEnew
16 Dec 2024
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes