Published:2023/08/28  Last Updated:2023/08/28

JVNVU#93886750
Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL

Overview

Some of the Windows kernel drivers provided by Phoenix Technologies Inc. is vulnerable to insufficient access control on its IOCTL.

Products Affected

This vulnerability was found in the driver file "TdkLib64.sys" by the reporter.
According to the developer, a patched driver was provided to the users who may be affected by this vulnerability in June 2023.
For more details, contact the developer.

Description

Some of the Windows kernel drivers provided by Phoenix Technologies Inc. is vulnerable to insufficient access control on its IOCTL (CWE-782, CVE-2023-35841).

Impact

By sending a specific IOCTL request, an attacker without the administrator privilege for the product may perform I/O to any hardware port or physical address, resulting in erasing or altering of the firmware.

Solution

Contact the developer
According to the developer, a patched driver was provided to the users who may be affected by this vulnerability in June 2023.

For more details, contact the developer.

Vendor Status

Vendor Link
Phoenix Technologies Inc. Support

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Base Score: 3.3
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

Takahiro Haruyama of VMware reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia