Vulnerability Description
The wsftprm.sys kernel driver 2.0.0.0 in Topaz Antifraud allows low-privileged attackers to kill any (Protected Process Light) process via an IOCTL (which will be named at a later time).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Topazevolution | Antifraud | <= 2.0.0.0 |
References
- https://northwave-cybersecurity.com/vulnerability-notice-topaz-antifraudExploitThird Party Advisory
- https://www.topazevolution.com/en/antifraud/Product
- https://northwave-cybersecurity.com/vulnerability-notice-topaz-antifraudExploitThird Party Advisory
- https://www.topazevolution.com/en/antifraud/Product
FAQ
What is CVE-2023-52271?
CVE-2023-52271 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The wsftprm.sys kernel driver 2.0.0.0 in Topaz Antifraud allows low-privileged attackers to kill any (Protected Process Light) process via an IOCTL (which will be named at a later time).
How severe is CVE-2023-52271?
CVE-2023-52271 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-52271?
Check the references section above for vendor advisories and patch information. Affected products include: Topazevolution Antifraud.