CVE-2019-16098
HIGH EXPLOITED IN THE WILD RANSOMWAREMicro-Star MSI Afterburner 4.6.2.15658 - Privilege Escalation
Title source: llmDescription
The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
Exploits (6)
nomisec
WORKING POC
30 stars
by Offensive-Panda · local
https://github.com/Offensive-Panda/NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE
nomisec
WORKING POC
6 stars
by 0xDivyanshu-new · local
https://github.com/0xDivyanshu-new/CVE-2019-16098
nomisec
SUSPICIOUS
by VortexCry-Organization · poc
https://github.com/VortexCry-Organization/VortexCry-Ransomware-Release
Scores
CVSS v3
7.8
EPSS
0.7660
EPSS Percentile
99.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2022-10-04
InTheWild.io
2022-10-07
Ransomware Use
Confirmed
CWE
CWE-125
CWE-787
Status
published
Products (1)
msi/afterburner
4.6.2.15658
Published
Sep 11, 2019
Tracked Since
Feb 18, 2026