CVE-2026-3609
Received Received - Intake
Privilege Escalation in Wellbia XIGNCODE3 xhunter1.sys Driver

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: CERT/CC

Description
Wellbia's XIGNCODE3 xhunter1.sys kernel driver Privilege Escalation Vulnerability provides access to IRP_MJ_REITS command interface, which allows any user process to request a PROCESS_ALL_ACCESS. Cross reference to KVE 2023-5589 (https://krcert.or.kr)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wellbia xigncode3 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in Wellbia's XIGNCODE3 xhunter1.sys kernel driver is a privilege escalation issue. It allows any user process to access the IRP_MJ_REITS command interface, which can be used to request PROCESS_ALL_ACCESS. This means that a non-privileged user process can gain full access rights to other processes.


How can this vulnerability impact me? :

This vulnerability can allow an attacker or malicious user to escalate their privileges on the affected system. By gaining PROCESS_ALL_ACCESS, they can control or manipulate other processes, potentially leading to unauthorized actions, data theft, or system compromise.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart