CVE-2025-10475
BaseFortify
Publication date: 2025-09-15
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| spyshelter | spyshelter | 15.4.0.1015 |
| spyshelter | spyshelter | 15.4.0.1028 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-404 | The product does not release or incorrectly releases a resource before it is made available for re-use. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-10475 is a local vulnerability in the SpyShelter.sys driver where a low-privilege user can exploit missing access control in the driver's IOCTL handler. This allows the attacker to send specially crafted IOCTL requests that forcibly terminate high-privilege or system processes, causing a denial of service by disrupting critical services or applications. [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing a local low-privilege user to terminate important system or administrative processes, leading to denial of service. This disruption can affect system availability and stability, potentially interrupting critical operations or services running on the affected system. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is a local privilege escalation and denial of service issue in the SpyShelter.sys driver caused by sending specially crafted IOCTL requests. Detection involves identifying attempts to send unauthorized IOCTL commands to the SpyShelter.sys driver. While no specific detection commands are provided, monitoring for unusual IOCTL requests or process terminations initiated by low-privilege users could help. The SpyShelter software includes a command line tool 'sps monitor' for real-time resource monitoring, which might assist in detecting abnormal behavior related to this vulnerability. [1, 4]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade SpyShelter to version 15.4.0.1028 or later, which addresses and eliminates this vulnerability. Since the attack requires local access, restricting local user privileges and monitoring for suspicious IOCTL activity can also help reduce risk until the upgrade is applied. [3]