The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with administrative privileges.
References
Configurations
History
04 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 |
21 Nov 2024, 05:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kagurazakasanae/Mhyprot2DrvControl - Third Party Advisory | |
References | () https://github.com/kkent030315/evil-mhyprot-cli - Third Party Advisory | |
References | () https://web.archive.org/web/20211204031301/https://www.godeye.club/2021/05/20/001-disclosure-mhyprot.html - Exploit, Third Party Advisory | |
References | () https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html - Exploit, Third Party Advisory | |
References | () https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims - Exploit, Press/Media Coverage, Third Party Advisory |
Information
Published : 2022-09-14 22:15
Updated : 2025-06-04 15:15
NVD link : CVE-2020-36603
Mitre link : CVE-2020-36603
CVE.ORG link : CVE-2020-36603
JSON object : View
Products Affected
hoyoverse
- mhyprot2
CWE