Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

2 vulnerabilities found for winflash by phoenixtech

CVE-2023-35841 (GCVE-0-2023-35841)

Vulnerability from nvd – Published: 2024-05-14 14:56 – Updated: 2025-07-28 20:49
VLAI?
Title
WinFlash Driver Permissions Issue
Summary
Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.This issue affects WinFlash Driver: before 4.5.0.0.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
  • CWE-782 - Exposed IOCTL with Insufficient Access Control
Assigner
Impacted products
Vendor Product Version
Phoenix WinFlash Driver Affected: 0 , < 4.5.0.0 (semver)
Create a notification for this product.
Credits
Takahiro Haruyama of Broadcom
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:phoenix:winflash_driver:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "winflash_driver",
            "vendor": "phoenix",
            "versions": [
              {
                "lessThan": "4.5.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35841",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T18:32:21.876164Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:18:27.432Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:30:45.376Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.phoenix.com/security-notifications/cve-2023-35841/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU93886750/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "WinFlash Driver",
          "vendor": "Phoenix",
          "versions": [
            {
              "lessThan": "4.5.0.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Takahiro Haruyama of Broadcom"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.\u003cp\u003eThis issue affects WinFlash Driver: before 4.5.0.0.\u003c/p\u003e"
            }
          ],
          "value": "Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.This issue affects WinFlash Driver: before 4.5.0.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-782",
              "description": "CWE-782 Exposed IOCTL with Insufficient Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T20:49:33.663Z",
        "orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
        "shortName": "Phoenix"
      },
      "references": [
        {
          "url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-35841/"
        },
        {
          "url": "https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU93886750/index.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "WinFlash Driver Permissions Issue",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
    "assignerShortName": "Phoenix",
    "cveId": "CVE-2023-35841",
    "datePublished": "2024-05-14T14:56:14.743Z",
    "dateReserved": "2023-06-19T00:35:50.974Z",
    "dateUpdated": "2025-07-28T20:49:33.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35841 (GCVE-0-2023-35841)

Vulnerability from cvelistv5 – Published: 2024-05-14 14:56 – Updated: 2025-07-28 20:49
VLAI?
Title
WinFlash Driver Permissions Issue
Summary
Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.This issue affects WinFlash Driver: before 4.5.0.0.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
  • CWE-782 - Exposed IOCTL with Insufficient Access Control
Assigner
Impacted products
Vendor Product Version
Phoenix WinFlash Driver Affected: 0 , < 4.5.0.0 (semver)
Create a notification for this product.
Credits
Takahiro Haruyama of Broadcom
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:phoenix:winflash_driver:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "winflash_driver",
            "vendor": "phoenix",
            "versions": [
              {
                "lessThan": "4.5.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35841",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T18:32:21.876164Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:18:27.432Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:30:45.376Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.phoenix.com/security-notifications/cve-2023-35841/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU93886750/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "WinFlash Driver",
          "vendor": "Phoenix",
          "versions": [
            {
              "lessThan": "4.5.0.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Takahiro Haruyama of Broadcom"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.\u003cp\u003eThis issue affects WinFlash Driver: before 4.5.0.0.\u003c/p\u003e"
            }
          ],
          "value": "Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.This issue affects WinFlash Driver: before 4.5.0.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-782",
              "description": "CWE-782 Exposed IOCTL with Insufficient Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T20:49:33.663Z",
        "orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
        "shortName": "Phoenix"
      },
      "references": [
        {
          "url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-35841/"
        },
        {
          "url": "https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU93886750/index.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "WinFlash Driver Permissions Issue",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
    "assignerShortName": "Phoenix",
    "cveId": "CVE-2023-35841",
    "datePublished": "2024-05-14T14:56:14.743Z",
    "dateReserved": "2023-06-19T00:35:50.974Z",
    "dateUpdated": "2025-07-28T20:49:33.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}