{"uuid": "0a661b7c-c639-4922-bf4d-e80067c1b889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12446", "type": "seen", "source": "https://t.me/arpsyndicate/133", "content": "#ExploitObserverAlert\n\nCVE-2020-12446\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-12446. The ene.sys driver in G.SKILL Trident Z Lighting Control through 1.00.08 exposes mapping and un-mapping of physical memory, reading and writing to Model Specific Register (MSR) registers, and input from and output to I/O ports to local non-privileged users. This leads to privilege escalation to NT AUTHORITY\\SYSTEM.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-13T00:52:09.000000Z"}