{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2018-12-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-05-19T12:39:35.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20181221 [CORE-2018-0007] - GIGABYTE Driver Elevation of Privilege Vulnerabilities","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://seclists.org/fulldisclosure/2018/Dec/39"},{"tags":["x_refsource_MISC"],"url":"https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities"},{"name":"106252","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/106252"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.gigabyte.com/Support/Security/1801"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-19321","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20181221 [CORE-2018-0007] - GIGABYTE Driver Elevation of Privilege Vulnerabilities","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2018/Dec/39"},{"name":"https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities","refsource":"MISC","url":"https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities"},{"name":"106252","refsource":"BID","url":"http://www.securityfocus.com/bid/106252"},{"name":"https://www.gigabyte.com/Support/Security/1801","refsource":"CONFIRM","url":"https://www.gigabyte.com/Support/Security/1801"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T11:30:04.276Z"},"title":"CVE Program Container","references":[{"name":"20181221 [CORE-2018-0007] - GIGABYTE Driver Elevation of Privilege Vulnerabilities","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2018/Dec/39"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities"},{"name":"106252","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/106252"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.gigabyte.com/Support/Security/1801"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2018-19321","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-04T20:40:19.496213Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-10-24","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-19321"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-19321","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","description":"CWE-noinfo Not enough information"}]}],"timeline":[{"time":"2022-10-24T00:00:00.000Z","lang":"en","value":"CVE-2018-19321 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:45:45.399Z"}}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2018-19321","datePublished":"2018-12-21T23:00:00.000Z","dateReserved":"2018-11-16T00:00:00.000Z","dateUpdated":"2025-10-21T23:45:45.399Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}