Exploit.CVE202131728 is Malwarebytes' detection name for 4 specific vulnerable drivers that can be used to disable security software
Incorrect access control in zam64.sys, zam32.sys allows a non-privileged process to open a handle, register itself with the driver, allocate executable memory, install a hook, and execute the executable memory using this hook, this exposes ring 0 code execution in the context of the driver allowing the non-privileged process to elevate privileges. We have found the files detected as Exploit.CVE202131728 to be used in so-called Bring Your Own Vulnerable Driver (BYOVD) attacks aimed at disabling security software on the targeted system.
If you are using software that depends on these drivers, you should check if there is a newer, non-vulnerable version available. If not, we would advise you to remove the software since there are ready-to-use exploits available for this vulnerability.
By removing this file, Malwarebytes protects users against the possible exploitation of the vulnerability listed as CVE-2021-31728.
Malwarebytes can detect and remove Exploit.CVE202131728 without further user interaction.
Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.
If you want to allow the program to connect to the Internet, for example to fetch updates, also add an exclusion of the type Allow an application to connect to the internet and use the Browse button to select the file you wish to grant access.
Select your language