Filtered by vendor Asrock Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2020-15368 1 Asrock 2 Rgb Driver, Rgb Driver Firmware 2024-11-21 5.5 Medium
AsrDrv103.sys in the ASRock RGB Driver does not properly restrict access from user space, as demonstrated by triggering a triple fault via a request to zero CR3.
CVE-2020-14032 1 Asrock 1 Box-r1000 Firmware 2024-11-21 9.8 Critical
ASRock 4x4 BOX-R1000 before BIOS P1.40 allows privilege escalation via code execution in the SMM.
CVE-2018-10712 1 Asrock 4 A-tuning, F-stream, Restart To Uefi and 1 more 2024-11-21 N/A
The AsrDrv101.sys and AsrDrv102.sys low-level drivers in ASRock RGBLED before v1.0.35.1, A-Tuning before v3.0.210, F-Stream before v3.0.210, and RestartToUEFI before v1.0.6.2 expose functionality to read/write data from/to IO ports. This could be leveraged in a number of ways to ultimately run code with elevated privileges.
CVE-2018-10711 1 Asrock 4 A-tuning, F-stream, Restart To Uefi and 1 more 2024-11-21 N/A
The AsrDrv101.sys and AsrDrv102.sys low-level drivers in ASRock RGBLED before v1.0.35.1, A-Tuning before v3.0.210, F-Stream before v3.0.210, and RestartToUEFI before v1.0.6.2 expose functionality to read and write Machine Specific Registers (MSRs). This could be leveraged to execute arbitrary ring-0 code.
CVE-2018-10710 1 Asrock 4 A-tuning, F-stream, Restart To Uefi and 1 more 2024-11-21 N/A
The AsrDrv101.sys and AsrDrv102.sys low-level drivers in ASRock RGBLED before v1.0.35.1, A-Tuning before v3.0.210, F-Stream before v3.0.210, and RestartToUEFI before v1.0.6.2 expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges.
CVE-2018-10709 1 Asrock 4 A-tuning, F-stream, Restart To Uefi and 1 more 2024-11-21 N/A
The AsrDrv101.sys and AsrDrv102.sys low-level drivers in ASRock RGBLED before v1.0.35.1, A-Tuning before v3.0.210, F-Stream before v3.0.210, and RestartToUEFI before v1.0.6.2 expose functionality to read and write CR register values. This could be leveraged in a number of ways to ultimately run code with elevated privileges.