First published: Wed Dec 14 2022(Updated: )
The MsIo64.sys component in Asus Aura Sync through v1.07.79 does not properly validate input to IOCTL 0x80102040, 0x80102044, 0x80102050, and 0x80102054, allowing attackers to trigger a memory corruption and cause a Denial of Service (DoS) or escalate privileges via crafted IOCTL requests.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Aura Sync | <=1.07.79 | |
<=1.07.79 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44898 is a vulnerability in the MsIo64.sys component of Asus Aura Sync through v1.07.79 that allows attackers to trigger a memory corruption and cause a Denial of Service (DoS) or escalate privileges via crafted IOCTL requests.
The severity of CVE-2022-44898 is rated as high with a CVSS score of 7.8.
CVE-2022-44898 affects Asus Aura Sync through v1.07.79 by allowing attackers to trigger a memory corruption and cause a Denial of Service (DoS) or escalate privileges.
To fix CVE-2022-44898, it is recommended to update Asus Aura Sync to a version that addresses the vulnerability.
Yes, you can find references related to CVE-2022-44898 at the following links: [Reference 1](http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html), [Reference 2](https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/), [Reference 3](https://www.asus.com/campaign/aura/us/download.php).