The wsftprm.sys kernel driver 2.0.0.0 in Topaz Antifraud allows low-privileged attackers to kill any (Protected Process Light) process via an IOCTL (which will be named at a later time).
References
| Link | Resource |
|---|---|
| https://northwave-cybersecurity.com/vulnerability-notice-topaz-antifraud | Exploit Third Party Advisory |
| https://www.topazevolution.com/en/antifraud/ | Product |
Configurations
History
11 Jan 2024, 19:59
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Topazevolution
Topazevolution antifraud |
|
| References | () https://northwave-cybersecurity.com/vulnerability-notice-topaz-antifraud - Exploit, Third Party Advisory | |
| References | () https://www.topazevolution.com/en/antifraud/ - Product | |
| CPE | cpe:2.3:a:topazevolution:antifraud:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo |
Information
Published : 2024-01-08 20:15
Updated : 2024-01-11 19:59
NVD link : CVE-2023-52271
Mitre link : CVE-2023-52271
CVE.ORG link : CVE-2023-52271
JSON object : View
Products Affected
topazevolution
- antifraud
CWE
