CVE-2024-33226

9.9 CRITICAL

📋 TL;DR

This vulnerability in Wistron Corporation's TBT Force Power Control driver allows attackers to escalate privileges and execute arbitrary code by sending crafted IOCTL requests to the Access64.sys component. Attackers with local access can gain SYSTEM-level privileges. Users of Wistron TBT Force Power Control software version 1.0.0.0 are affected.

💻 Affected Systems

Products:
  • Wistron Corporation TBT Force Power Control
Versions: v1.0.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system; driver must be loaded and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across networks.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and driver signature enforcement are in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available; requires local access but no authentication beyond that.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Wistron Corporation's official website or contact vendor for security updates. If no patch is available, implement workarounds.

🔧 Temporary Workarounds

Disable or remove vulnerable driver

windows

Uninstall TBT Force Power Control software or disable the Access64.sys driver

sc stop TBTForcePowerControl
sc delete TBTForcePowerControl

Restrict driver loading

windows

Use Windows group policy to block loading of unsigned or specific drivers

🧯 If You Can't Patch

  • Implement strict endpoint detection and response (EDR) to monitor for suspicious driver activity
  • Apply least privilege principles and restrict local access to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check if Access64.sys driver from Wistron TBT Force Power Control v1.0.0.0 is present in system32\drivers directory

Check Version:

Check software version in Control Panel > Programs and Features or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Wistron\TBT Force Power Control

Verify Fix Applied:

Verify driver is removed or updated to a patched version; check driver signature status

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installation events for TBTForcePowerControl
  • Driver load events for Access64.sys
  • Suspicious IOCTL requests to vulnerable driver

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=7045 AND ServiceName="TBTForcePowerControl" OR DriverName="Access64.sys"

🔗 References

📤 Share & Export