Cyber Posture

CVE-2024-55412

High

Published: 07 January 2025

Published
07 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-55412 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Sunix (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-41 (Port and I/O Device Access) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly restricts low-privileged access to I/O ports and devices, preventing exploitation of arbitrary read/write via crafted IOCTLs in snxpsamd.sys.

prevent

Requires validation of IOCTL inputs to the vulnerable driver, blocking specially crafted requests that enable privilege escalation and information disclosure.

prevent

Mandates timely identification, reporting, and correction of flaws like the IOCTL vulnerability in the SUNIX snxpsamd.sys driver.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1553.002 Code Signing Defense Impairment
Adversaries may create, acquire, or steal code signing materials to sign their malware or tools.
Why these techniques?

Vulnerable signed driver enables local privilege escalation via arbitrary I/O port access (T1068) and bypasses driver code signing enforcement to load malicious kernel code (T1553.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under…

more

high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.

Deeper analysisAI

CVE-2024-55412 is a vulnerability in the snxpsamd.sys driver within SUNIX Serial Driver x64 version 10.1.0.0. It enables low-privileged users to read and write arbitrary I/O ports through specially crafted IOCTL requests. The issue, published on 2025-01-07, carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-787.

Low-privileged local attackers can exploit this vulnerability to achieve privilege escalation, execute code under high privileges, and perform information disclosure. As a signed driver, it can also bypass Microsoft's driver-signing policy, facilitating the deployment of malicious code.

Details on the vulnerability, including potential exploitation techniques, are available in the GitHub repository at https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55412/CVE-2024-55412_snxpsamd.sys_README.md. The vendor website is at https://www.sunix.com/tw/.

Details

CWE(s)

Affected Products

Sunix
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-55413Shared CWE-787
CVE-2025-20890Shared CWE-787
CVE-2025-20888Shared CWE-787
CVE-2026-0117Shared CWE-787
CVE-2024-53833Shared CWE-787
CVE-2026-0010Shared CWE-787
CVE-2026-31743Shared CWE-787
CVE-2025-47373Shared CWE-787
CVE-2026-0037Shared CWE-787
CVE-2025-21785Shared CWE-787

References