CVE-2025-51060: n/a
An issue was discovered in CPUID cpuz.sys 1.0.5.4. An attacker can use DeviceIoControl with the unvalidated parameters 0x9C402440 and 0x9C402444 as IoControlCodes to perform RDMSR and WRMSR, respectively. Through this process, the attacker can modify MSR_LSTAR and hook KiSystemCall64. Afterward, using Return-Oriented Programming (ROP), the attacker can manipulate the stack with pre-prepared gadgets, disable the SMAP flag in the CR4 register, and execute a user-mode syscall handler in the kernel context. It has not been confirmed whether this works on 32-bit Windows, but it functions on 64-bit Windows if the core isolation feature is either absent or disabled.
AI Analysis
Technical Summary
CVE-2025-51060 is a privilege escalation vulnerability found in the CPUID cpuz.sys driver version 1.0.5.4. The vulnerability arises from the driver's improper validation of input parameters passed to the DeviceIoControl interface, specifically the IOCTL codes 0x9C402440 and 0x9C402444. These IOCTL codes allow an attacker to perform RDMSR (Read Model-Specific Register) and WRMSR (Write Model-Specific Register) operations, which are privileged CPU instructions typically restricted to kernel mode. By exploiting this flaw, an attacker can modify the MSR_LSTAR register, which controls the address of the system call handler in 64-bit Windows. This enables the attacker to hook the KiSystemCall64 function, effectively redirecting system calls to a malicious handler. The attacker then uses Return-Oriented Programming (ROP) techniques to manipulate the stack with carefully chosen instruction sequences (gadgets), disable the Supervisor Mode Access Prevention (SMAP) flag in the CR4 control register, and execute user-mode syscall handlers within kernel context. This chain of actions allows the attacker to bypass kernel security mechanisms and execute arbitrary code with kernel privileges. The vulnerability is confirmed to work on 64-bit Windows systems where the core isolation feature is either disabled or not present. It remains unconfirmed whether 32-bit Windows systems are affected. Core isolation is a security feature that provides virtualization-based security to protect critical kernel components, and its absence or disablement increases the attack surface. No patches or fixes have been publicly disclosed yet, and there are no known exploits in the wild at this time. The vulnerability requires local access to the system to invoke the vulnerable IOCTL calls, but it does not require user interaction beyond that. The lack of input validation and the ability to perform privileged CPU instructions from user mode make this a severe security issue that could be leveraged for full system compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where CPUID's CPU-Z driver is installed and core isolation is disabled or unsupported. Successful exploitation would allow attackers to escalate privileges from user mode to kernel mode, potentially leading to complete system compromise, data theft, or disruption of critical services. This could impact confidentiality, integrity, and availability of sensitive information and systems. Organizations relying on Windows 64-bit systems without core isolation enabled are particularly vulnerable. The ability to bypass kernel protections undermines endpoint security controls and could facilitate the deployment of persistent malware, rootkits, or ransomware. Given that core isolation is not universally enabled by default and may be disabled for compatibility reasons, many enterprise systems remain exposed. This vulnerability could be exploited by insider threats or malware that gains initial user-level access, amplifying the damage. The absence of known exploits in the wild currently limits immediate risk, but the technical details suggest a high potential for weaponization. European organizations in sectors with high-value targets such as finance, government, critical infrastructure, and technology are at elevated risk due to the potential for impactful kernel-level compromise.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify whether CPUID cpuz.sys version 1.0.5.4 or similar vulnerable versions are present on their systems and remove or update the driver if possible. 2) Enable Windows core isolation and memory integrity features across all 64-bit Windows endpoints to prevent exploitation, as these features block unauthorized kernel code execution and protect critical kernel structures. 3) Implement strict application whitelisting and device control policies to prevent unauthorized installation or use of vulnerable drivers. 4) Monitor for unusual DeviceIoControl calls with the specified IOCTL codes (0x9C402440 and 0x9C402444) using endpoint detection and response (EDR) tools to detect potential exploitation attempts. 5) Restrict local user privileges to minimize the ability of attackers to invoke privileged IOCTLs. 6) Maintain up-to-date endpoint protection solutions capable of detecting ROP and kernel hooking techniques. 7) Engage with CPUID or relevant vendors for patches or updated driver versions and apply them promptly once available. 8) Conduct regular security audits and penetration testing to identify and remediate similar privilege escalation vectors. These steps go beyond generic advice by focusing on driver management, kernel protection features, and behavioral monitoring specific to this vulnerability's exploitation method.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-51060: n/a
Description
An issue was discovered in CPUID cpuz.sys 1.0.5.4. An attacker can use DeviceIoControl with the unvalidated parameters 0x9C402440 and 0x9C402444 as IoControlCodes to perform RDMSR and WRMSR, respectively. Through this process, the attacker can modify MSR_LSTAR and hook KiSystemCall64. Afterward, using Return-Oriented Programming (ROP), the attacker can manipulate the stack with pre-prepared gadgets, disable the SMAP flag in the CR4 register, and execute a user-mode syscall handler in the kernel context. It has not been confirmed whether this works on 32-bit Windows, but it functions on 64-bit Windows if the core isolation feature is either absent or disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-51060 is a privilege escalation vulnerability found in the CPUID cpuz.sys driver version 1.0.5.4. The vulnerability arises from the driver's improper validation of input parameters passed to the DeviceIoControl interface, specifically the IOCTL codes 0x9C402440 and 0x9C402444. These IOCTL codes allow an attacker to perform RDMSR (Read Model-Specific Register) and WRMSR (Write Model-Specific Register) operations, which are privileged CPU instructions typically restricted to kernel mode. By exploiting this flaw, an attacker can modify the MSR_LSTAR register, which controls the address of the system call handler in 64-bit Windows. This enables the attacker to hook the KiSystemCall64 function, effectively redirecting system calls to a malicious handler. The attacker then uses Return-Oriented Programming (ROP) techniques to manipulate the stack with carefully chosen instruction sequences (gadgets), disable the Supervisor Mode Access Prevention (SMAP) flag in the CR4 control register, and execute user-mode syscall handlers within kernel context. This chain of actions allows the attacker to bypass kernel security mechanisms and execute arbitrary code with kernel privileges. The vulnerability is confirmed to work on 64-bit Windows systems where the core isolation feature is either disabled or not present. It remains unconfirmed whether 32-bit Windows systems are affected. Core isolation is a security feature that provides virtualization-based security to protect critical kernel components, and its absence or disablement increases the attack surface. No patches or fixes have been publicly disclosed yet, and there are no known exploits in the wild at this time. The vulnerability requires local access to the system to invoke the vulnerable IOCTL calls, but it does not require user interaction beyond that. The lack of input validation and the ability to perform privileged CPU instructions from user mode make this a severe security issue that could be leveraged for full system compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where CPUID's CPU-Z driver is installed and core isolation is disabled or unsupported. Successful exploitation would allow attackers to escalate privileges from user mode to kernel mode, potentially leading to complete system compromise, data theft, or disruption of critical services. This could impact confidentiality, integrity, and availability of sensitive information and systems. Organizations relying on Windows 64-bit systems without core isolation enabled are particularly vulnerable. The ability to bypass kernel protections undermines endpoint security controls and could facilitate the deployment of persistent malware, rootkits, or ransomware. Given that core isolation is not universally enabled by default and may be disabled for compatibility reasons, many enterprise systems remain exposed. This vulnerability could be exploited by insider threats or malware that gains initial user-level access, amplifying the damage. The absence of known exploits in the wild currently limits immediate risk, but the technical details suggest a high potential for weaponization. European organizations in sectors with high-value targets such as finance, government, critical infrastructure, and technology are at elevated risk due to the potential for impactful kernel-level compromise.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify whether CPUID cpuz.sys version 1.0.5.4 or similar vulnerable versions are present on their systems and remove or update the driver if possible. 2) Enable Windows core isolation and memory integrity features across all 64-bit Windows endpoints to prevent exploitation, as these features block unauthorized kernel code execution and protect critical kernel structures. 3) Implement strict application whitelisting and device control policies to prevent unauthorized installation or use of vulnerable drivers. 4) Monitor for unusual DeviceIoControl calls with the specified IOCTL codes (0x9C402440 and 0x9C402444) using endpoint detection and response (EDR) tools to detect potential exploitation attempts. 5) Restrict local user privileges to minimize the ability of attackers to invoke privileged IOCTLs. 6) Maintain up-to-date endpoint protection solutions capable of detecting ROP and kernel hooking techniques. 7) Engage with CPUID or relevant vendors for patches or updated driver versions and apply them promptly once available. 8) Conduct regular security audits and penetration testing to identify and remediate similar privilege escalation vectors. These steps go beyond generic advice by focusing on driver management, kernel protection features, and behavioral monitoring specific to this vulnerability's exploitation method.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68924ac9ad5a09ad00eadd63
Added to database: 8/5/2025, 6:17:45 PM
Last enriched: 8/5/2025, 6:32:46 PM
Last updated: 8/18/2025, 1:22:21 AM
Views: 17
Related Threats
CVE-2025-55205: CWE-863: Incorrect Authorization in projectcapsule capsule
CriticalCVE-2025-55201: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in copier-org copier
HighCVE-2025-54421: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NamelessMC Nameless
HighCVE-2025-54118: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in NamelessMC Nameless
MediumCVE-2025-54117: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in NamelessMC Nameless
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.