
Cloud Vulnerability DB
A community-led vulnerabilities database
A privilege escalation vulnerability (CVE-2024-9157) exists in CxUIUSvc64.exe and CxUIUSvc32.exe of Synaptics audio drivers. The vulnerability allows a local authorized attacker to load a DLL in a privileged process. This vulnerability was disclosed on March 11, 2025, and affects Synaptics audio driver components distributed with Windows Update (NVD).
The vulnerability is caused by the Synaptics service opening a named pipe without any meaningful Access Control Lists (ACLs) and expecting clients to provide the name of a DLL which is then loaded into the Synaptics process. This implementation flaw may allow even a remote unprivileged user to provide a malicious DLL to be loaded in the context of the service. The vulnerability has been assigned a CVSS 3.1 base score of 7.8 HIGH with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (Talos).
Successful exploitation of this vulnerability could allow an attacker to gain elevated system privileges, potentially leading to complete system compromise. The vulnerability affects both confidentiality and integrity of the system by allowing unauthorized DLL loading in a privileged context (NVD).
Microsoft has released security updates to address this vulnerability as part of the March 2025 Patch Tuesday updates. Users are strongly advised to apply the latest security updates. Additionally, the product is marked as End-of-Life and should be removed from systems where possible (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."