CVE-2018-19323
📋 TL;DR
This vulnerability in GIGABYTE driver software allows attackers to read and write Machine Specific Registers (MSRs), which are low-level CPU control registers. This enables privilege escalation from user mode to kernel mode, potentially giving attackers full system control. Users of affected GIGABYTE software on Windows systems are vulnerable.
💻 Affected Systems
- GIGABYTE APP Center
- AORUS GRAPHICS ENGINE
- XTREME GAMING ENGINE
- OC GURU II
📦 What is this software?
Oc Guru Ii by Gigabyte
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with kernel-level access, allowing installation of persistent malware, credential theft, and bypassing all security controls.
Likely Case
Local privilege escalation enabling attackers to gain SYSTEM/administrator privileges from a standard user account.
If Mitigated
Limited impact if systems have strict user privilege separation and application whitelisting preventing unauthorized driver loading.
🎯 Exploit Status
Exploitation requires local access but is straightforward once code execution is achieved. The vulnerability is well-documented with public proof-of-concept code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: APP Center v1.06.21, AORUS GRAPHICS ENGINE 1.57+, XTREME GAMING ENGINE 1.26+, OC GURU II v2.09+
Vendor Advisory: https://www.gigabyte.com/Support/Security/1801
Restart Required: Yes
Instructions:
1. Uninstall affected GIGABYTE software. 2. Download latest versions from official GIGABYTE website. 3. Install updated versions. 4. Restart system to ensure old driver is unloaded.
🔧 Temporary Workarounds
Remove vulnerable driver
windowsUninstall affected GIGABYTE applications to remove the vulnerable GDrv.sys driver
Control Panel > Programs and Features > Uninstall affected GIGABYTE software
sc delete GDrv
del C:\Windows\System32\drivers\GDrv.sys
Driver block policy
windowsUse Windows group policy to block loading of the vulnerable driver
gpedit.msc > Computer Configuration > Windows Settings > Security Settings > System Services > Find GDrv > Set to Disabled
🧯 If You Can't Patch
- Remove all affected GIGABYTE software from critical systems
- Implement strict application control policies to prevent unauthorized driver loading
🔍 How to Verify
Check if Vulnerable:
Check for presence of GDrv.sys driver in C:\Windows\System32\drivers\ and verify installed GIGABYTE software versions
Check Version:
wmic product get name,version | findstr /i gigabyte
Verify Fix Applied:
Verify GDrv.sys is removed or updated driver version, and check installed GIGABYTE software shows patched versions
📡 Detection & Monitoring
Log Indicators:
- Event ID 7045: Service installation for GDrv
- Driver load events for GDrv.sys
- Process creation from GIGABYTE utilities
Network Indicators:
- No network indicators - local vulnerability only
SIEM Query:
source="*security*" AND (event_id=7045 AND service_name="GDrv") OR (process_name="*gigabyte*" OR process_name="*aorus*")
🔗 References
- http://seclists.org/fulldisclosure/2018/Dec/39
- http://www.securityfocus.com/bid/106252
- https://www.gigabyte.com/Support/Security/1801
- https://www.gigabyte.com/tw/Support/Utility/Graphics-Card
- https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities
- http://seclists.org/fulldisclosure/2018/Dec/39
- http://www.securityfocus.com/bid/106252
- https://www.gigabyte.com/Support/Security/1801
- https://www.gigabyte.com/tw/Support/Utility/Graphics-Card
- https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-19323