Sploit.io - Search

Product: X, version: 6.1.3-24058 (Dell Protected Workspace)

CVE-2016-9038

Severity: Unknown

Description: An exploitable double fetch vulnerability exists in the SboxDrv.sys driver functionality of Invincea-X 6.1.3-24058. A specially crafted input buffer and race condition can result in kernel memory corruption, which could result in privilege escalation. An attacker needs to execute a special application locally to trigger this vulnerability.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000270000
  • Percentile: 0.076040000
  • Date: 2026-03-26

ExploitDB

No data available.

HackerOne Data

  • Rank: 8971
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Invincea X - Versions: 6.1.3-24058 (Dell Protected Workspace)

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2016-9038 is a double fetch vulnerability within the SboxDrv.sys driver of Invincea-X 6.1.3-24058 (Dell Protected Workspace). This allows for kernel memory corruption, potentially leading to privilege escalation. The vulnerability requires a local attacker to execute a special application, indicating a degree of access is already present. However, successful exploitation could grant the attacker higher privileges than initially held, potentially leading to full system control. The CVSS v3.0 score of 7.8 (High) indicates a significant risk. The business impact could include data breaches, system compromise, and potential disruption of services. Likelihood of exploitation is moderate, as it requires local access and a specifically crafted input. Ease of exploitation is considered high once local access is obtained, as it's a kernel-level vulnerability. Impacts to confidentiality, integrity, and availability are all high, as corrupted kernel memory can affect all aspects of the system. The EPSS score of 0.000270000 suggests the vulnerability is not widely exploited in the wild, but the potential impact warrants attention.

    2. Potential Attack Scenarios
    An attacker with local access to a system running Invincea-X 6.1.3-24058 can leverage this vulnerability. The scenario unfolds as follows: the attacker executes a specially crafted application that interacts with the SboxDrv.sys driver. This application sends a specifically crafted input buffer to the driver, triggering the double fetch vulnerability. This leads to kernel memory corruption, allowing the attacker to overwrite critical kernel data structures. By carefully controlling the overwritten data, the attacker can escalate their privileges to SYSTEM level. The attacker then gains full control of the machine, potentially installing malware, stealing sensitive data, or disrupting system operations. This attack vector is particularly dangerous as it allows a user with limited privileges to gain full control over the system.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2016-9038 is to update Invincea-X to a version that addresses the vulnerability. Dell released updated versions of Protected Workspace to resolve this issue. Patching should be prioritized, especially for systems exposed to potentially malicious users or applications. In the interim, restrict the execution of untrusted applications on systems running Invincea-X. Implement application whitelisting where possible to limit the attack surface. Regularly review system logs for suspicious activity related to the SboxDrv.sys driver. Further information about the vulnerability can be found at SecurityFocus: http://www.securityfocus.com/bid/99360 and Talos Intelligence: https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0256. Ensure proper testing of the patch in a non-production environment before deploying it widely.

    4. Executive Summary
    CVE-2016-9038 is a high-severity vulnerability in Invincea-X 6.1.3-24058 (Dell Protected Workspace) that allows for kernel memory corruption and potential privilege escalation. While requiring local access, a successful attack could grant an attacker full control of the affected system, leading to data breaches, system compromise, and service disruption. The vulnerability is triggered by a specially crafted application interacting with the SboxDrv.sys driver. To mitigate this risk, it is critical to patch Invincea-X to the latest version as soon as possible. Restricting untrusted application execution and monitoring system logs are also recommended. Addressing this vulnerability is important to protect sensitive data and ensure the continued availability of affected systems. Prompt action will minimize the risk of a successful attack and the resulting business impact.