JVNVU#90671953
Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL
Overview
CG/MG family driver cg6kwin2k.sys provided by Sangoma Technologies is vulnerable to insufficient access control on its IOCTL.
Products Affected
- cg6kwin2k.sys versions prior to 2.1.7.0
Description
CG/MG family driver cg6kwin2k.sys provided by Sangoma Technologies is vulnerable to insufficient access control on its IOCTL (CWE-782).
Impact
By sending a specific IOCTL request, a user without the administrator privilege may perform I/O to arbitrary hardware port or physical address, resulting in erasing or altering of the firmware.
Solution
Update the Device Driver
Update the device driver to the latest version according to the information provided by the developer.
The developer addressed the vulnerability in the following version:
- cg6kwin2k.sys 2.1.7.0, included in Sangoma NaturalAccess Development Environment Release 9.0.9 (NA-9.0.9-Server-2019_2022-80.amd64.exe)
Vendor Status
Vendor | Link |
Sangoma Technologies | Natural Access Software Download |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
Takahiro Haruyama of Broadcom Carbon Black reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-29216 |
JVN iPedia |
|