First published: Tue Oct 10 2023(Updated: )
An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver through 2.2.100.1 (aka AGRSM64.sys). There is Local Privilege Escalation to SYSTEM via a Stack Overflow in RTLCopyMemory (IOCTL 0x1b2150). An attacker can exploit this to elevate privileges from a medium-integrity process to SYSTEM. This can also be used to bypass kernel-level protections such as AV or PPL, because exploit code runs with high-integrity privileges and can be used in coordinated BYOVD (bring your own vulnerable driver) ransomware campaigns.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Lsi Pci-sv92ex Firmware | <=2.2.100.1 | |
Broadcom Lsi Pci-sv92ex |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-31096 is high with a score of 7.8.
CVE-2023-31096 allows local privilege escalation to SYSTEM via a stack overflow in RTLCopyMemory (IOCTL 0x1b2150) in the Broadcom LSI PCI-SV92EX firmware version up to and including 2.2.100.1.
No, CVE-2023-31096 requires local access to exploit the vulnerability.
Yes, the Broadcom LSI PCI-SV92EX modem is vulnerable to CVE-2023-31096 if it is running firmware version up to and including 2.2.100.1.
To mitigate the vulnerability, it is recommended to update the Broadcom LSI PCI-SV92EX firmware to a version higher than 2.2.100.1.