Vulnerability identifier: #VU15552
Vulnerability risk: High
CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2018-10712
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
ASRock RGBLED
Hardware solutions /
Drivers
ASRock RestartToUEFI
Hardware solutions /
Drivers
ASRock F-Stream
Hardware solutions /
Drivers
ASRock A-Tuning
Hardware solutions /
Drivers
Vendor: ASRock
Description
The vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to exposure of functionality to read/write data from/to IO ports. A remote attacker can execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Mitigation
Update ASRock RGBLED to version 1.0.36
Update ASRock A-Tuning to version 3.0.216,
Update ASRock F-Stream to version 3.0.216,
Update ASRock RestartToUEFI to version 1.0.7.
Vulnerable software versions
ASRock RGBLED: before 1.0.36
ASRock RestartToUEFI: before 1.0.7
ASRock F-Stream: before 3.0.216
ASRock A-Tuning: before 3.0.216
External links
https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.