MSI Announces Update to Fix Local Privilege Escalation Vulnerability in MSICenter

TapTechNews July 6th news, MSI has issued a security bulletin, urging users to upgrade the MSICenter application to version 2.0.38.0 as soon as possible to fix the local privilege escalation vulnerability CVE-2024-37726.

TapTechNews note: MSICenter is an exclusive application specifically designed for MSI's e-sports series, which can provide optimized performance and efficiency for gamers and other users.

In versions 2.0.36.0 and earlier, there is a local privilege escalation vulnerability with the tracking number CVE-2024-37726, allowing users with only standard privileges to take full control of the system.

Developers say that low-privilege users create a directory, then OpLock a file in the directory, and use the MSICenter Export System Information function to trigger a write operation on the OpLocked file.

After the OpLock function is activated, users can move the original file and then create a link (symbolic link) pointing to the target file. MSICenter overwrites or deletes the target file (via the junction link) with SYSTEM permissions.

MSI Announces Update to Fix Local Privilege Escalation Vulnerability in MSICenter_0

Likes