CVE-2023-44976 (GCVE-0-2023-44976)
Vulnerability from cvelistv5
Published
2025-08-01 00:00
Modified
2025-08-01 14:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-782 - Exposed IOCTL with Insufficient Access Control
Summary
Hangzhou Shunwang Rentdrv2 before 2024-12-24 allows local users to terminate EDR processes and possibly have unspecified other impact via DeviceIoControl with control code 0x22E010, as exploited in the wild in October 2023.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hangzhou Shunwang | Rentdrv2 |
Version: 1aed62a63b4802e599bbd33162319129501d603cceeb5e1eb22fd4733b3018a3 < Version: 9165d4f3036919a96b86d24b64d75d692802c7513f2b3054b20be40c212240a5 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-44976", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-01T14:27:49.967204Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-01T14:28:01.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Rentdrv2", "vendor": "Hangzhou Shunwang", "versions": [ { "status": "affected", "version": "1aed62a63b4802e599bbd33162319129501d603cceeb5e1eb22fd4733b3018a3", "versionType": "custom" }, { "status": "affected", "version": "9165d4f3036919a96b86d24b64d75d692802c7513f2b3054b20be40c212240a5", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Hangzhou Shunwang Rentdrv2 before 2024-12-24 allows local users to terminate EDR processes and possibly have unspecified other impact via DeviceIoControl with control code 0x22E010, as exploited in the wild in October 2023." } ], "metrics": [ { "cvssV3_1": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-782", "description": "CWE-782 Exposed IOCTL with Insufficient Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-01T13:43:36.843Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/keowu/BadRentdrv2" }, { "url": "https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-44976", "datePublished": "2025-08-01T00:00:00.000Z", "dateReserved": "2023-10-02T00:00:00.000Z", "dateUpdated": "2025-08-01T14:28:01.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-44976\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-08-01T14:15:34.350\",\"lastModified\":\"2025-08-04T15:06:15.833\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hangzhou Shunwang Rentdrv2 before 2024-12-24 allows local users to terminate EDR processes and possibly have unspecified other impact via DeviceIoControl with control code 0x22E010, as exploited in the wild in October 2023.\"},{\"lang\":\"es\",\"value\":\"Hangzhou Shunwang Rentdrv2 anterior al 24/12/2024 permite a los usuarios locales finalizar procesos EDR y posiblemente tener otro impacto no especificado a trav\u00e9s de DeviceIoControl con el c\u00f3digo de control 0x22E010, como se explot\u00f3 en la naturaleza en octubre de 2023.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L\",\"baseScore\":3.2,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.5,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-782\"}]}],\"references\":[{\"url\":\"https://github.com/keowu/BadRentdrv2\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/\",\"source\":\"cve@mitre.org\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-44976\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-01T14:27:49.967204Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-01T14:27:54.498Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 3.2, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L\"}}], \"affected\": [{\"vendor\": \"Hangzhou Shunwang\", \"product\": \"Rentdrv2\", \"versions\": [{\"status\": \"affected\", \"version\": \"1aed62a63b4802e599bbd33162319129501d603cceeb5e1eb22fd4733b3018a3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9165d4f3036919a96b86d24b64d75d692802c7513f2b3054b20be40c212240a5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://github.com/keowu/BadRentdrv2\"}, {\"url\": \"https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Hangzhou Shunwang Rentdrv2 before 2024-12-24 allows local users to terminate EDR processes and possibly have unspecified other impact via DeviceIoControl with control code 0x22E010, as exploited in the wild in October 2023.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-782\", \"description\": \"CWE-782 Exposed IOCTL with Insufficient Access Control\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-08-01T13:43:36.843Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-44976\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-01T14:28:01.549Z\", \"dateReserved\": \"2023-10-02T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-08-01T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…