Published:2024/03/21  Last Updated:2024/03/21

JVNVU#90671953
Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL

Overview

CG/MG family driver cg6kwin2k.sys provided by Sangoma Technologies is vulnerable to insufficient access control on its IOCTL.

Products Affected

  • cg6kwin2k.sys versions prior to 2.1.7.0

Description

CG/MG family driver cg6kwin2k.sys provided by Sangoma Technologies is vulnerable to insufficient access control on its IOCTL (CWE-782).

Impact

By sending a specific IOCTL request, a user without the administrator privilege may perform I/O to arbitrary hardware port or physical address, resulting in erasing or altering of the firmware.

Solution

Update the Device Driver
Update the device driver to the latest version according to the information provided by the developer.
The developer addressed the vulnerability in the following version:

  • cg6kwin2k.sys 2.1.7.0, included in Sangoma NaturalAccess Development Environment Release 9.0.9 (NA-9.0.9-Server-2019_2022-80.amd64.exe)

Vendor Status

Vendor Link
Sangoma Technologies Natural Access Software Download

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Base Score: 6.1
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

Takahiro Haruyama of Broadcom Carbon Black reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-29216
JVN iPedia