CVE-2024-55412

7.8 HIGH

📋 TL;DR

A vulnerability in SUNIX Serial Driver x64 (snxpsamd.sys) allows low-privileged users to perform arbitrary I/O port read/write operations through crafted IOCTL requests. This can lead to privilege escalation, high-privilege code execution, and information disclosure. Affected users are those running the vulnerable driver version on Windows systems.

💻 Affected Systems

Products:
  • SUNIX Serial Driver x64
Versions: 10.1.0.0
Operating Systems: Windows x64 systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable driver to be installed and loaded. Signed driver could bypass Microsoft driver-signing policy.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM, deployment of persistent malware, and complete data exfiltration.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative rights on compromised systems.

🟢

If Mitigated

Limited impact with proper access controls, driver blocklisting, and monitoring in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access.
🏢 Internal Only: HIGH - Malicious insiders or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low-privileged access and knowledge of driver IOCTL interface. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SUNIX website for updated version

Vendor Advisory: https://www.sunix.com/tw/

Restart Required: No

Instructions:

1. Visit SUNIX website for driver updates. 2. Download latest driver version. 3. Uninstall current driver. 4. Install updated driver. 5. Verify driver version.

🔧 Temporary Workarounds

Driver Blocklisting

Windows

Block loading of vulnerable driver using Windows Driver Block Rules

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Driver Security\Driver Block Rules" /v "{GUID}" /t REG_SZ /d "snxpsamd.sys" /f

Remove Vulnerable Driver

Windows

Uninstall the vulnerable driver if not required

pnputil /delete-driver snxpsamd.inf /uninstall
sc delete snxpsamd

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit low-privileged user access
  • Monitor for suspicious driver loading events and IOCTL requests

🔍 How to Verify

Check if Vulnerable:

Check driver version: Open Device Manager > Serial ports > SUNIX Serial Driver Properties > Driver tab

Check Version:

driverquery /v | findstr /i snxpsamd

Verify Fix Applied:

Verify driver version is updated from 10.1.0.0 and check Windows Event Log for driver loading events

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installation for snxpsamd
  • Event ID 6: Driver loaded (snxpsamd.sys)
  • Unusual IOCTL requests to \Device\snxpsamd

Network Indicators:

  • No network indicators - local vulnerability only

SIEM Query:

source="*" (EventCode=7045 AND ServiceName="snxpsamd") OR (EventCode=6 AND ImageLoaded="*snxpsamd.sys")

🔗 References

📤 Share & Export