CVE-2025-51060
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-05

Last updated on: 2025-10-09

Assigner: MITRE

Description
An issue was discovered in CPUID cpuz.sys 1.0.5.4. An attacker can use DeviceIoControl with the unvalidated parameters 0x9C402440 and 0x9C402444 as IoControlCodes to perform RDMSR and WRMSR, respectively. Through this process, the attacker can modify MSR_LSTAR and hook KiSystemCall64. Afterward, using Return-Oriented Programming (ROP), the attacker can manipulate the stack with pre-prepared gadgets, disable the SMAP flag in the CR4 register, and execute a user-mode syscall handler in the kernel context. It has not been confirmed whether this works on 32-bit Windows, but it functions on 64-bit Windows if the core isolation feature is either absent or disabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-05
Last Modified
2025-10-09
Generated
2026-05-07
AI Q&A
2025-08-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cpuid cpuz.sys 1.0.5.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in CPUID cpuz.sys version 1.0.5.4, where an attacker can use specific unvalidated DeviceIoControl parameters to perform RDMSR and WRMSR operations. By doing so, the attacker can modify the MSR_LSTAR register and hook the KiSystemCall64 function. Using Return-Oriented Programming (ROP), the attacker can manipulate the stack, disable the SMAP flag in the CR4 register, and execute a user-mode syscall handler with kernel privileges. This exploit works on 64-bit Windows systems if core isolation is absent or disabled, and it is unclear if it works on 32-bit Windows.


How can this vulnerability impact me? :

This vulnerability allows an attacker to escalate privileges by executing user-mode code with kernel-level privileges, potentially leading to full system compromise. The attacker can manipulate system calls and bypass security features like SMAP, which can result in unauthorized access, data manipulation, or control over the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart