• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – FBR Phishing Page Targeting Multiple Banks
August 10, 2019
Rewterz Threat Advisory – CVE-2019-9569 – Delta ICS Flaw Allows Total Industrial Takeover
August 13, 2019

Rewterz Threat Advisory – Windows 10: Privilege Escalation Vulnerabilities Found in Over 40 Drivers

August 13, 2019

Severity

Medium

Analysis Summary

More than 40 drivers from at least twenty hardware vendors have been reported to have vulnerabilities that may lead to privilege escalation. Such vulnerabilities have previously been exploited in the wild by attackers like the Slingshot APT and APT28 aka Fancy Bear, for privilege escalation. The vulnerabilities are critical, since a driver code enables communication between the OS kernel and the hardware, having a higher permission level. Moreover, Hardware firmware is also updated through drivers, so these vulnerabilities can also be leveraged to reach and alter the functioning of deeper critical components. Researchers report that these vulnerabilities can be exploited to gain highly privileged access to the hardware resources, such as read and write access to processor and chipset I/O space, Model Specific Registers (MSR), Control Registers (CR), Debug Registers (DR), physical memory and kernel virtual memory.

These drivers affect all modern versions of Windows, including Windows 10. Using these vulnerabilities, the components could be disabled, triggering a denial-of-service condition on the system.
Reports claim that even if systems do not have an outdated vulnerable driver installed, threat actors may add one to their target systems for privilege escalation and persistence purposes.

Impact

  • Privilege Escalation
  • Denial of Service

Affected Vendors

  • ASRock
  • ASUSTeK Computer
  • ATI Technologies (AMD)
  • American Megatrends International (AMI)
  • Biostar
  • EVGA
  • Getac
  • GIGABYTE
  • Huawei
  • Insyde
  • Intel
  • Micro-Star International (MSI)
  • NVIDIA
  • Phoenix Technologies

Affected Products

Drivers

Remediation

No universal mechanism is currently available to prevent windows machines from loading vulnerable drivers. Other solutions to mitigate this threat include regular scanning for outdated system and component firmware, and applying the latest driver fixes, as soon as they are released by device manufactures, in order to resolve any vulnerabilities.

  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.