Skip to main content
Skip to main content
Microsoft Security Intelligence
6 entries found.
Updated on Mar 25, 2025

VulnerableDriver:WinNT/Winring0.A is a malicious version of a legitimate kernel-mode driver, WinRing0.sys, which contained a known vulnerability under CVE-2020-14979. The driver existed for many years before the vulnerability was discovered in 2020, it provides a way to access hardware components, such as CPU and memory without notification. The driver is bundled with several popular hardware-monitoring, overclocking, and RGB lighting control utilities, such as old versions of CapFrameX, EVGA Precision X1, FanCtrl, HWiNFO, Libre Hardware Monitor, MSI Afterburner, Open Hardware Monitor, OpenRGB, OmenMon, Panorama9, Razer Synapse, SteelSeries Engine, and ZenTimings. 

The problem can be triggered through a technique known as Bring Your Own Vulnerable Driver (BYOVD) to exploit this vulnerable driver. It exploits the ring-0 driver in order to launch code with corrupted kernel-level privileges. Once the code runs, it can often be used to circumvent security protections to deactivate antivirus software, install ransomware, or to install persistent code for later attacks. Microsoft Defender identifies the vulnerable driver, and blocks the attack vector. 

Alert level: severe
Updated on May 20, 2025

VulnerableDriver:WinNT/Winring0.B is a malicious version of a legitimate kernel-mode driver, WinRing0.sys, which contained a known vulnerability under CVE-2020-14979. The driver existed for many years before the vulnerability was discovered in 2020, it provides a way to access hardware components, such as CPU and memory without notification. The driver is bundled with several popular hardware-monitoring, overclocking, and RGB lighting control utilities, such as old versions of CapFrameX, EVGA Precision X1, FanCtrl, HWiNFO, Libre Hardware Monitor, MSI Afterburner, Open Hardware Monitor, OpenRGB, OmenMon, Panorama9, Razer Synapse, SteelSeries Engine, and ZenTimings. 

The problem can be triggered through a technique known as Bring Your Own Vulnerable Driver (BYOVD) to exploit this vulnerable driver. It exploits the ring-0 driver in order to launch code with corrupted kernel-level privileges. Once the code runs, it can often be used to circumvent security protections to deactivate antivirus software, install ransomware, or to install persistent code for later attacks. Microsoft Defender identifies the vulnerable driver, and blocks the attack vector. 

Alert level: severe
Updated on May 20, 2025

VulnerableDriver:WinNT/Winring0.D is a malicious version of a legitimate kernel-mode driver, WinRing0.sys, which contained a known vulnerability under CVE-2020-14979. The driver existed for many years before the vulnerability was discovered in 2020, it provides a way to access hardware components, such as CPU and memory without notification. The driver is bundled with several popular hardware-monitoring, overclocking, and RGB lighting control utilities, such as old versions of CapFrameX, EVGA Precision X1, FanCtrl, HWiNFO, Libre Hardware Monitor, MSI Afterburner, Open Hardware Monitor, OpenRGB, OmenMon, Panorama9, Razer Synapse, SteelSeries Engine, and ZenTimings. 

The problem can be triggered through a technique known as Bring Your Own Vulnerable Driver (BYOVD) to exploit this vulnerable driver. It exploits the ring-0 driver in order to launch code with corrupted kernel-level privileges. Once the code runs, it can often be used to circumvent security protections to deactivate antivirus software, install ransomware, or to install persistent code for later attacks. Microsoft Defender identifies the vulnerable driver and blocks the attack vector. 

Alert level: severe
Updated on May 20, 2025

VulnerableDriver:WinNT/Winring0.C is a malicious version of a legitimate kernel-mode driver, WinRing0.sys, which contained a known vulnerability under CVE-2020-14979. The driver existed for many years before the vulnerability was discovered in 2020, it provides a way to access hardware components, such as CPU and memory without notification. The driver is bundled with several popular hardware-monitoring, overclocking, and RGB lighting control utilities, such as old versions of CapFrameX, EVGA Precision X1, FanCtrl, HWiNFO, Libre Hardware Monitor, MSI Afterburner, Open Hardware Monitor, OpenRGB, OmenMon, Panorama9, Razer Synapse, SteelSeries Engine, and ZenTimings. 

The problem can be triggered through a technique known as Bring Your Own Vulnerable Driver (BYOVD) to exploit this vulnerable driver. It exploits the ring-0 driver in order to launch code with corrupted kernel-level privileges. Once the code runs, it can often be used to circumvent security protections to deactivate antivirus software, install ransomware, or to install persistent code for later attacks. Microsoft Defender identifies the vulnerable driver and blocks the attack vector. 

Alert level: severe
Updated on Jul 22, 2025

VulnerableDriver:WinNT/Winring0.G is a malicious version of a legitimate kernel-mode driver, WinRing0.sys, which contained a known vulnerability under CVE-2020-14979. The driver existed for many years before the vulnerability was discovered in 2020, it provides a way to access hardware components, such as CPU and memory without notification. The driver is bundled with several popular hardware-monitoring, overclocking, and RGB lighting control utilities, such as old versions of CapFrameX, EVGA Precision X1, FanCtrl, HWiNFO, Libre Hardware Monitor, MSI Afterburner, Open Hardware Monitor, OpenRGB, OmenMon, Panorama9, Razer Synapse, SteelSeries Engine, and ZenTimings. 

The problem can be triggered through a technique known as Bring Your Own Vulnerable Driver (BYOVD) to exploit this vulnerable driver. It exploits the ring-0 driver in order to launch code with corrupted kernel-level privileges. Once the code runs, it can often be used to circumvent security protections to deactivate antivirus software, install ransomware, or to install persistent code for later attacks. Microsoft Defender identifies the vulnerable driver, and blocks the attack vector. 

Alert level: severe
Updated on Oct 02, 2025
Alert level: severe