TapTechNews July 6th news, MSI has issued a security bulletin, urging users to upgrade the MSICenter application to version 2.0.38.0 as soon as possible to fix the local privilege escalation vulnerability CVE-2024-37726.
TapTechNews note: MSICenter is an exclusive application specifically designed for MSI's e-sports series, which can provide optimized performance and efficiency for gamers and other users.
In versions 2.0.36.0 and earlier, there is a local privilege escalation vulnerability with the tracking number CVE-2024-37726, allowing users with only standard privileges to take full control of the system.
Developers say that low-privilege users create a directory, then OpLock a file in the directory, and use the MSICenter Export System Information function to trigger a write operation on the OpLocked file.
After the OpLock function is activated, users can move the original file and then create a link (symbolic link) pointing to the target file. MSICenter overwrites or deletes the target file (via the junction link) with SYSTEM permissions.