This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote Windows host contains a driver that is affected by a local
privilege escalation vulnerability.
netOctopus Agent, an asset management agent, is installed on the
The installed version of netOctopus Agent includes a driver, named
'nantsys.sys', that exposes a device interface writable by all local
users, allowing them to read and write arbitrary CPU Model Specific
Registers (MSRs). A local user could leverage this issue to execute
arbitrary code in kernel mode.
See also :
Remove the affected driver using the vendor-supplied script referenced
in the advisory above.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false