CVE-2020-17382

7.8 HIGH

📋 TL;DR

This vulnerability in the MSI AmbientLink MsIo64 driver allows local attackers to execute arbitrary code with kernel privileges via buffer overflow in IOCTL handlers. It affects systems running the vulnerable driver version, typically on Windows machines with MSI hardware. Successful exploitation requires local access but can lead to full system compromise.

💻 Affected Systems

Products:
  • MSI AmbientLink software
  • MSI Dragon Center
  • MSI Mystic Light
Versions: MsIo64 driver version 1.0.0.8
Operating Systems: Windows 10, Windows 8.1, Windows 7
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with MSI hardware (motherboards, graphics cards) that use AmbientLink/Dragon Center software. The vulnerable driver is typically installed alongside these applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with kernel-level privileges, enabling installation of persistent malware, credential theft, and disabling of security controls.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM/administrator privileges, allowing attackers to bypass security restrictions and install additional payloads.

🟢

If Mitigated

Limited impact if proper endpoint protection, driver signature enforcement, and least privilege principles are implemented.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Malicious insiders or compromised user accounts could exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Public exploit code exists on Packet Storm Security. Exploitation requires local user access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest MSI Dragon Center/AmbientLink software (check MSI support site for specific version)

Vendor Advisory: https://us.msi.com/support/download/vga

Restart Required: Yes

Instructions:

1. Visit MSI support website for your hardware. 2. Download latest Dragon Center/AmbientLink software. 3. Uninstall current version. 4. Install updated version. 5. Restart system.

🔧 Temporary Workarounds

Disable or remove vulnerable driver

windows

Uninstall MSI AmbientLink/Dragon Center software and remove the MsIo64.sys driver

sc stop MsIo64
sc delete MsIo64
Remove from Device Manager or Programs and Features

Restrict driver loading

windows

Use Windows Driver Signature Enforcement to prevent unsigned/unauthorized drivers

bcdedit /set nointegritychecks off
bcdedit /set testsigning off

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users don't have local admin rights
  • Deploy endpoint detection and response (EDR) solutions to detect driver manipulation and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under System devices for MsIo64 driver, or run: driverquery | findstr MsIo64

Check Version:

driverquery /v | findstr /i "msio64"

Verify Fix Applied:

Verify driver version is no longer 1.0.0.8 and check that updated MSI software is installed

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 7045: Service installation
  • Driver load events for MsIo64.sys
  • Process creation with elevated privileges from non-admin users

Network Indicators:

  • No network indicators - local exploitation only

SIEM Query:

EventID=7045 AND ServiceName="MsIo64" OR ProcessName="MsIo64.sys" AND ParentProcess!="services.exe"

🔗 References

📤 Share & Export