{"vulnerability": "CVE-2020-1351", "sightings": [{"uuid": "138accf7-1005-490e-abc5-c4405efd6350", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13513", "type": "seen", "source": "https://t.me/cibsecurity/21093", "content": "\u203c CVE-2020-13513 \u203c\n\nA privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0dc gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T22:44:13.000000Z"}, {"uuid": "d3861929-39c4-410e-8c16-91f441bff06c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13519", "type": "seen", "source": "https://t.me/cibsecurity/21091", "content": "\u203c CVE-2020-13519 \u203c\n\nA privilege escalation vulnerability exists in the WinRing0x64 Driver IRP 0x9c402088 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T22:44:11.000000Z"}, {"uuid": "636bf0b3-94f4-4078-9aa2-0fe2fcc57fb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13515", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}, {"uuid": "d9dc4856-d7ff-4506-8279-2d24d11694cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13510", "type": "seen", "source": "https://t.me/cibsecurity/21044", "content": "\u203c CVE-2020-13510 \u203c\n\nAn information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) using the IRP 0x9c4060d0 gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:25.000000Z"}, {"uuid": "74ef3300-a7b5-4215-97b0-ee346a23d53e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13517", "type": "seen", "source": "https://t.me/cibsecurity/21040", "content": "\u203c CVE-2020-13517 \u203c\n\nAn information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c406104 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:21.000000Z"}, {"uuid": "b15b7726-4128-4db5-b365-4e52bbff9a19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13518", "type": "seen", "source": "https://t.me/cibsecurity/21037", "content": "\u203c CVE-2020-13518 \u203c\n\nAn information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c402084 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:18.000000Z"}, {"uuid": "2b3698ac-41fe-4f4c-bb66-5a805d3f6c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13511", "type": "seen", "source": "https://t.me/cibsecurity/21036", "content": "\u203c CVE-2020-13511 \u203c\n\nAn information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) using the IRP 0x9c4060d4 gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:17.000000Z"}, {"uuid": "3d14abf0-f985-4658-aa51-8c9ebe0448b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13515", "type": "seen", "source": "https://t.me/cibsecurity/21098", "content": "\u203c CVE-2020-13515 \u203c\n\nA privilege escalation vulnerability exists in the WinRing0x64 Driver IRP 0x9c40a148 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause an adversary to obtain elevated privileges. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T22:44:19.000000Z"}, {"uuid": "d9ce2385-bbd0-4182-b8a1-a27c52e1c7e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13516", "type": "seen", "source": "https://t.me/cibsecurity/21031", "content": "\u203c CVE-2020-13516 \u203c\n\nAn information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c406144 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:09.000000Z"}, {"uuid": "2be7a0dc-4c25-4c3c-bf59-dc483328e9d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13514", "type": "seen", "source": "https://t.me/cibsecurity/21086", "content": "\u203c CVE-2020-13514 \u203c\n\nA privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0e0 gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T22:44:06.000000Z"}, {"uuid": "972728f8-1226-4b51-a808-1d6248028d71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13512", "type": "seen", "source": "https://t.me/cibsecurity/21089", "content": "\u203c CVE-2020-13512 \u203c\n\nA privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0d8 gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T22:44:09.000000Z"}, {"uuid": "e3ae1ed7-9729-4d18-aad7-a98705051df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13518", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}, {"uuid": "fedf7214-ef9b-4dae-913b-6060f754eadf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13517", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}, {"uuid": "beb534e4-ca15-4d53-8467-02c6e12efbc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13514", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}, {"uuid": "c62e810d-5522-4333-bcd3-3d5426ce0d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13516", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}, {"uuid": "14b360b0-d176-4f2b-8600-0df4e21d37ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13519", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}, {"uuid": "1455f916-60fa-41e0-88d0-5d06b7743bad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13511", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}]}