![]() Be in control like never before with the Dragon Center 2.0. Read/write 1/2/4 bytes to or from an IO port.Īttackers could exploit these issues to achieve local privilege escalation from low-privileged users to NT AUTHORITY\SYSTEM. The Dragon Center 2.0 app is to be installed in users MSI gaming notebooks, you can get total control over your PC.Read/write Model-Specific Registers (MSRs) via the _readmsr/_writemsr functions calls. ![]() Directly interact with physical memory via the MmMapIoSpace function call, mapping physical memory into a virtual address user-space.WinRing0.sys - 8AC34EB21B9B38F67CD29684C45696C20AB2E75AĪll the vulnerabilities are triggered by sending specific IOCTL requests and will allow to:.<= 2.0.116.0 is vulnerable to multiple Privilege Escalation (LPE/EoP) vulnerabilities in the following drivers components: Micro-Star International ( MSI) Dragon Center v.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |