CVE-2024-33222

8.4 HIGH

📋 TL;DR

This vulnerability in ASUS ATSZIO Driver allows attackers to send crafted IOCTL requests to the ATSZIO64.sys driver component, enabling privilege escalation and arbitrary code execution. It affects systems running ASUS ATSZIO Driver version 0.2.1.7 on Windows operating systems.

💻 Affected Systems

Products:
  • ASUS ATSZIO Driver
Versions: v0.2.1.7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where the vulnerable driver is installed, typically ASUS systems with this specific driver version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM-level privileges, enabling installation of persistent malware, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from a lower-privileged user account to SYSTEM, allowing attackers to bypass security controls and execute malicious payloads.

🟢

If Mitigated

Limited impact if proper driver signing enforcement and least privilege principles are implemented, though the vulnerability still exists.

🌐 Internet-Facing: LOW - This is a local driver vulnerability requiring local access or malware execution first.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system, they can exploit this to gain full control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Public proof-of-concept code exists in the DriverHunter repository. Exploitation requires local access or ability to execute code first.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check ASUS support website for updated driver versions. If available, download and install the latest ATSZIO driver from official ASUS sources.

🔧 Temporary Workarounds

Disable or Remove Vulnerable Driver

windows

Uninstall the vulnerable ATSZIO driver or disable its loading

sc stop ATSZIO
sc delete ATSZIO
Remove driver via Device Manager

Block Driver Loading via Policy

windows

Use Windows policy to block loading of the vulnerable driver

Use Windows Defender Application Control or AppLocker to block ATSZIO64.sys

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit initial access opportunities
  • Monitor for suspicious driver loading events and IOCTL requests to ATSZIO64.sys

🔍 How to Verify

Check if Vulnerable:

Check if ATSZIO64.sys driver version 0.2.1.7 is present in system32\drivers directory or via driver query commands

Check Version:

driverquery /v | findstr ATSZIO or check file properties of system32\drivers\ATSZIO64.sys

Verify Fix Applied:

Verify the driver is no longer present or has been updated to a newer version

📡 Detection & Monitoring

Log Indicators:

  • Driver load events for ATSZIO64.sys
  • Suspicious IOCTL requests to the driver
  • Privilege escalation events

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=7045 OR EventID=4697 WHERE ServiceName='ATSZIO' OR ImagePath contains 'ATSZIO64.sys'

🔗 References

📤 Share & Export