AMD ATI atillk64.sys 5.11.9.0 allows low-privileged users to interact directly with physical memory by calling one of several driver routines that map physical memory into the virtual address space of the calling process. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges via a DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-4453 AMD ATI atillk64.sys 5.11.9.0 allows low-privileged users to interact directly with physical memory by calling one of several driver routines that map physical memory into the virtual address space of the calling process. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges via a DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00435}

epss

{'score': 0.00669}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:48:58.329Z

Reserved: 2020-04-24T00:00:00

Link: CVE-2020-12138

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-27T15:15:12.750

Modified: 2024-11-21T04:59:19.553

Link: CVE-2020-12138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.