Impact
The vulnerability resides in Wellbia's XIGNCODE3 kernel driver, xhunter1.sys. It exposes the IRP_MJ_REITS command interface, allowing any user‑process to request PROCESS_ALL_ACCESS. When granted, the process receives full control of the system kernel, effectively giving it root privileges. This flaw permits an attacker to escape normal user isolation and execute arbitrary code with system authority.
Affected Systems
The affected product is Wellbia XIGNCODE3 Anti‑Cheat. No specific versions are listed in the CNA data, so all releases employing the xhunter1.sys driver are potentially vulnerable.
Risk and Exploitability
The CVSS score is not provided, and the EPSS score is unavailable, but the vulnerability clearly enables local privilege escalation, which is a severe risk. It is not currently listed in the CISA KEV catalog. The likely attack vector is a local user process that can be leveraged to target the driver’s command interface; no evidence that remote exploitation is possible is given in the CVE text. The attacker would gain PROCESS_ALL_ACCESS, effectively full system control.
OpenCVE Enrichment