📱 Pilote Windows malveillant : Ă©lĂ©vation de privilĂšges (CVSS 8.8) via IOCTL, manipulation du registre et lecture disque
📝 Selon une analyse publiĂ©e sur zeifan.my, un pilote Windows malveillant prĂ©sente une vulnĂ©rabilitĂ© d’é...
📖 cyberveille : https://cyberveille.ch/posts/2025-08-10-pilote-windows-malveillant-elevation-de-privileges-cvss-8-8-via-ioctl-manipulation-du-registre-et-lecture-disque/
🌐 source : https://zeifan.my/Ampa-Driver-Analysis/
#IOCTL #Persistance #Cyberveille
Pilote Windows malveillant : élévation de privilÚges (CVSS 8.8) via IOCTL, manipulation du registre et lecture disque

Selon une analyse publiĂ©e sur zeifan.my, un pilote Windows malveillant prĂ©sente une vulnĂ©rabilitĂ© d’élĂ©vation de privilĂšges de sĂ©vĂ©ritĂ© Ă©levĂ©e (CVSS 8.8), avec des capacitĂ©s de manipulation du registre et d’accĂšs disque brut. L’étude dĂ©crit trois interfaces de pĂ©riphĂ©rique exposĂ©es par le pilote (\Device\wogui, \Device\wowrt, \Device\wowreg001) et leurs gestionnaires IRP, qui ouvrent la voie Ă  des actions critiques. Les vulnĂ©rabilitĂ©s clĂ©s incluent la suppression arbitraire de clĂ©s de registre HKLM, la modification de l’entrĂ©e BootExecute pour la persistance, et des lectures disque non restreintes au niveau secteur, permettant potentiellement de contourner des contrĂŽles de sĂ©curitĂ©.

CyberVeille
#sydbox-3.29.0 has been released! This release adds support for #Landlock ABIs 4, 5, and 6. ABI 4 offers #network confinement, 5 confines #ioctl operations, 6 has scoped unix abstract sockets and signaling. #sydbox is a rock-solid #application #kernel to #sandbox apps on #Linux >=5.19 written in #rustlang: https://is.gd/j5O16R #exherbo

I tried out #node-virtual-gamepads (https://github.com/jehervy/node-virtual-gamepads
).

#ioctl syscall crashes with #ENOTTY after I select 'gamepad'.

but we'll call this 'promising'. probably will be easier to add #gamepad support to #uxnemu than to try to wade through the levels of complexity to get #squeekboard to behave nicer under #SDL (it tells me unknown keyboard layout sometimes at compile)

GitHub - jehervy/node-virtual-gamepads: Node virtual gamepads

Node virtual gamepads. Contribute to jehervy/node-virtual-gamepads development by creating an account on GitHub.

Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape - Google Project Zero disclosed the bug before a patch becomes available from Microsoft. https://threatpost.com/unpatched-windows-zero-day-exploited-sandbox-escape/160828/ #localprivilegeescalation #securityvulnerability #googleprojectzero #vulnerabilities #7-daydisclosure #bufferoverflow #cve-2020-17087 #proofofconcept #sandboxescape #inthewild #windows10 #zero-day #exploit #windows #kernel #crash #ioctl #bug
Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape

Google Project Zero disclosed the bug before a patch becomes available from Microsoft.

Threatpost - English - Global - threatpost.com