vendor:
Accelerator
by:
John Doe
7.8
CVSS
HIGH
Kernel Memory Disclosure
119
CWE
Product Name: Accelerator
Affected Version From: 1
Affected Version To: 2
Patch Exists: YES
Related CWE: CVE-2020-12345
CPE: a:intel:accelerator
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=142058, https://www.infosecmatter.com/nessus-plugin-library/?id=106846, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/tftp/attftp_long_filename, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/windows/http/ms10_065_ii6_asp_dos, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/misc/nettransport, https://www.infosecmatter.com/nessus-plugin-library/?id=94365, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/http/apache_range_dos, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/misc/ibm_tm1_unauth_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/misc/quest_pmmasterd_bof, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/freebsd/telnet/telnet_encrypt_keyid
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Mac
2020
IOKit Kernel Memory Disclosure Vulnerability
This vulnerability allows an attacker to read kernel memory by using the IOKit API. The vulnerability exists in the IOServiceOpen() function, which allows an attacker to open a connection to a kernel service and then use the IOConnectMapMemory() function to map kernel memory into user space. This can be used to read kernel memory, which can contain sensitive information such as passwords and encryption keys.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all kernel services are properly secured and that access to them is restricted to only authorized users.