The MODAPI.sys driver in MSI Dragon Center 2.0.104.0 exposes functionality that allows low-privileged users to write an arbitrary value to a Model-Specific Register (MSR) at the specified address via specially crafted IOCTL requests.
A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.