CVE-2023-52271

Published Jan 8, 2024

Last updated a year ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2023-52271 describes a vulnerability found in the `wsftprm.sys` kernel driver, version 2.0.0.0, within Topaz Antifraud software. This flaw permits attackers with low privileges to terminate any Protected Process Light (PPL) process. The vulnerability operates through an IOCTL (Input/Output Control) call, allowing a low-privileged user to make arbitrary calls to kernel functions that can kill processes on the system. This capability can be exploited to bypass anti-malware protections, such as those offered by Microsoft Defender.

Description
The wsftprm.sys kernel driver 2.0.0.0 in Topaz Antifraud allows low-privileged attackers to kill any (Protected Process Light) process via an IOCTL (which will be named at a later time).
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
6.5
Impact score
4
Exploitability score
2
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Severity
MEDIUM

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo

Social media

Hype score
Not currently trending

Configurations