In MADEFORNET HTTP Debugger through 9.12, the Windows service does not set the seclevel registry key before launching the driver. Thus, it is possible for an unprivileged application to obtain a handle to the NetFilterSDK wrapper before the service obtains exclusive access.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://ctrl-c.club/~blue/nfsdk.html | third party advisory exploit technical description |
https://www.madefornet.com/products.html | product |
https://www.michaelrowley.dev/research/posts/nfsdk/nfsdk.html | broken link |