HomeWibuCVE-2018-3990

CVE-2018-3990

CRITICAL
9.3CVSS
Published: 2019-02-05
Updated: 2024-11-21
AI Analysis

Description

An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.

CVSS Metrics

Vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
none
User Action
none
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-119

Metadata

Primary Vendor
WIBU
Published
2/5/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

wibu : wibukey

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2018-3990 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com