We’ve just published the third and final part in our new series on Windows kernel driver vulnerability research and exploitation.
Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3:
https://security.humanativaspa.it/exploiting-amd-atdcm64a-sys-arbitrary-pointer-dereference-part-3/
In the previous articles, we covered the discovery of an arbitrary MSR read and an arbitrary pointer dereference vulnerability, and successfully confirmed them by putting together two PoCs. This time, we will craft a full exploit that chains both vulnerabilities to enable all privileges on Windows. Happy hacking!
#HumanativaGroup #HNSecurity #VulnerabilityResearch #ExploitDevelopment #Windows