{"vulnerability": "CVE-2020-13511", "sightings": [{"uuid": "2b3698ac-41fe-4f4c-bb66-5a805d3f6c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13511", "type": "seen", "source": "https://t.me/cibsecurity/21036", "content": "\u203c CVE-2020-13511 \u203c\n\nAn information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) using the IRP 0x9c4060d4 gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:17.000000Z"}, {"uuid": "1455f916-60fa-41e0-88d0-5d06b7743bad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13511", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}]}