CVE-2024-55411

8.8 HIGH

📋 TL;DR

This vulnerability in SUNIX Multi I/O Card driver allows attackers with local access to perform arbitrary read/write operations in kernel memory via crafted IOCTL requests. It affects systems using SUNIX Multi I/O Card v10.1.0.0 driver on Windows. Attackers could escalate privileges or compromise system integrity.

💻 Affected Systems

Products:
  • SUNIX Multi I/O Card
Versions: v10.1.0.0
Operating Systems: Windows (specific versions using this driver)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default driver installation. Requires attacker to have ability to execute code locally.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via kernel privilege escalation leading to persistent backdoor installation, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation allowing attackers to gain SYSTEM privileges and bypass security controls.

🟢

If Mitigated

Limited impact if proper access controls restrict local user privileges and driver loading.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from internet.
🏢 Internal Only: HIGH - Malicious insiders or compromised accounts with local access can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Proof-of-concept available on GitHub. Requires local code execution and knowledge of driver interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SUNIX website for updated driver version

Vendor Advisory: https://www.sunix.com/tw/

Restart Required: Yes

Instructions:

1. Visit SUNIX website 2. Download latest driver version 3. Uninstall current driver 4. Install updated driver 5. Reboot system

🔧 Temporary Workarounds

Restrict driver loading

Windows

Use Windows Device Guard or AppLocker to block loading of vulnerable snxpcamd.sys driver

AppLocker: New-AppLockerPolicy -RuleType Driver -Action Deny -Path "C:\Windows\System32\drivers\snxpcamd.sys" -User Everyone

Remove vulnerable driver

Windows

Uninstall SUNIX Multi I/O Card driver if not required

pnputil /delete-driver snxpcamd.inf /uninstall
sc delete snxpcamd

🧯 If You Can't Patch

  • Implement strict least privilege - ensure users don't have local admin rights
  • Monitor for suspicious driver loading events and IOCTL calls to snxpcamd.sys

🔍 How to Verify

Check if Vulnerable:

Check driver version: Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like "*SUNIX*"} | Select-Object DeviceName, DriverVersion

Check Version:

driverquery /v | findstr /i sunix

Verify Fix Applied:

Verify driver version is updated and no longer v10.1.0.0

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installed - snxpcamd
  • Suspicious IOCTL calls to snxpcamd.sys driver
  • Unexpected driver loading events

Network Indicators:

  • Not network exploitable - local vulnerability only

SIEM Query:

source="*security*" AND (event_id=7045 AND service_name="snxpcamd") OR (process_name="*" AND target_object="*snxpcamd.sys*")

🔗 References

📤 Share & Export