{"vulnerability": "CVE-2020-12446", "sightings": [{"uuid": "32353cfd-a3a3-485e-b2e5-eb017d5eeca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12446", "type": "published-proof-of-concept", "source": "Telegram/cXGJKAtM4hUs9woTQlzEUCh6Ji7hbJ9irNNz-IXtpxYJiW8", "content": "", "creation_timestamp": "2025-11-17T21:00:05.000000Z"}, {"uuid": "800ce76b-f560-4340-b640-81585ab28e5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12446", "type": "published-proof-of-concept", "source": "Telegram/fTHUl5MtxPQT56QLjrBKmgRn6IjdFlIA7evP9z5kwdufqPY", "content": "", "creation_timestamp": "2026-04-09T15:00:18.000000Z"}, {"uuid": "0a661b7c-c639-4922-bf4d-e80067c1b889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12446", "type": "seen", "source": "https://t.me/arpsyndicate/133", "content": "#ExploitObserverAlert\n\nCVE-2020-12446\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-12446. The ene.sys driver in G.SKILL Trident Z Lighting Control through 1.00.08 exposes mapping and un-mapping of physical memory, reading and writing to Model Specific Register (MSR) registers, and input from and output to I/O ports to local non-privileged users. This leads to privilege escalation to NT AUTHORITY\\SYSTEM.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-13T00:52:09.000000Z"}]}