CVE-2024-55413

7.8 HIGH

📋 TL;DR

A vulnerability in SUNIX Parallel Driver x64 (snxppamd.sys) allows low-privileged users to perform arbitrary I/O port read/write operations through specially crafted IOCTL requests. This can lead to privilege escalation, high-privilege code execution, and information disclosure. Affected users are those running the vulnerable driver on Windows systems.

💻 Affected Systems

Products:
  • SUNIX Parallel Driver x64
Versions: 10.1.0.0
Operating Systems: Windows x64 systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable driver to be installed and loaded. The driver is signed, which could allow bypass of Microsoft driver-signing policies.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through privilege escalation to SYSTEM, deployment of persistent malware via driver signing bypass, and complete data exfiltration.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges on compromised systems.

🟢

If Mitigated

Limited impact if proper access controls prevent low-privileged users from executing code or if driver is not present.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Malicious insiders or compromised low-privileged accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires low-privileged access and knowledge of IOCTL crafting. The driver signing could facilitate more sophisticated attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SUNIX website for updated driver version

Vendor Advisory: https://www.sunix.com/tw/

Restart Required: No

Instructions:

1. Visit SUNIX website for driver updates. 2. Download and install the latest parallel driver. 3. Verify the vulnerable driver file (snxppamd.sys) is replaced with patched version.

🔧 Temporary Workarounds

Driver Removal

Windows

Remove the vulnerable driver if not required for system functionality

sc stop snxppamd
sc delete snxppamd
del C:\Windows\System32\drivers\snxppamd.sys

Access Control Restriction

Windows

Restrict low-privileged user access to driver operations

icacls C:\Windows\System32\drivers\snxppamd.sys /deny Users:(R,X)

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit low-privileged user capabilities
  • Monitor for suspicious driver loading or IOCTL requests from non-administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check if snxppamd.sys version 10.1.0.0 exists in C:\Windows\System32\drivers\

Check Version:

powershell Get-Item C:\Windows\System32\drivers\snxppamd.sys | Select-Object VersionInfo

Verify Fix Applied:

Verify driver file version is updated from 10.1.0.0 and check system logs for successful driver loading

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installation for snxppamd
  • Driver load events for snxppamd.sys
  • Unusual IOCTL requests to parallel port driver

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

source="*security*" AND (event_id=7045 AND service_name="snxppamd") OR (process_name="snxppamd.sys")

🔗 References

📤 Share & Export