Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61155: n/a

0
Medium
VulnerabilityCVE-2025-61155cvecve-2025-61155
Published: Tue Oct 28 2025 (10/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-61155 is an access control vulnerability in the GameDriverX64. sys kernel-mode anti-cheat driver (version 7. 23. 4. 7 and earlier). A non-administrative user-mode process can send crafted IOCTL requests to the driver, which executes them in kernel mode without proper validation. This allows termination of arbitrary processes, including critical system and security services, potentially disrupting system availability. The vulnerability requires local access and low privileges but no user interaction. It has a medium CVSS score of 5. 5, reflecting limited confidentiality and integrity impact but high availability impact.

AI-Powered Analysis

AILast updated: 01/31/2026, 07:57:12 UTC

Technical Analysis

CVE-2025-61155 identifies a security vulnerability in the GameDriverX64.sys kernel-mode anti-cheat driver, versions 7.23.4.7 and earlier. The flaw lies in an IOCTL handler that lacks proper access control and authentication checks. User-mode processes with low privileges can open a handle to the driver device and send specially crafted IOCTL requests. These requests are executed in kernel mode without validation, enabling attackers to terminate arbitrary processes, including critical system and security services. This can lead to denial of service conditions by disrupting essential OS functions or security software. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. Exploitation requires local access with low privileges but no administrative rights or user interaction, increasing the risk of misuse by unprivileged users or malware. The CVSS v3.1 score is 5.5 (medium severity), reflecting the ease of exploitation and high impact on availability. No patches or known exploits are currently reported, but the vulnerability represents a significant risk for systems running the affected anti-cheat driver, commonly used in gaming environments. The underlying CWE-400 (Uncontrolled Resource Consumption) suggests the vulnerability could be leveraged to exhaust system resources or disrupt process management.

Potential Impact

For European organizations, the primary impact of CVE-2025-61155 is on system availability and operational continuity. The ability to terminate critical system and security processes without administrative privileges can lead to denial of service, disabling endpoint protection, or causing system instability. This is particularly concerning for organizations with gaming-related operations, e-sports platforms, or those using the affected anti-cheat software. Additionally, compromised availability of security services increases the risk of further exploitation by other malware or attackers. Although confidentiality and integrity are not directly affected, the disruption of security services can indirectly facilitate more severe attacks. The vulnerability's local access requirement limits remote exploitation but does not eliminate risk from insider threats or malware running with user-level privileges. European organizations with high reliance on gaming infrastructure or sensitive operational environments should prioritize mitigation to prevent potential service disruptions and security lapses.

Mitigation Recommendations

1. Restrict access to the GameDriverX64.sys device interface by enforcing strict permissions, ensuring only trusted processes and users can communicate with the driver. 2. Implement application whitelisting and endpoint protection to detect and block unauthorized attempts to open handles or send IOCTL requests to the driver. 3. Monitor system logs and kernel driver interactions for unusual IOCTL activity indicative of exploitation attempts. 4. Isolate gaming or anti-cheat software environments from critical business systems to limit potential impact. 5. Engage with the software vendor to obtain patches or updates addressing the vulnerability as soon as they become available. 6. Educate users about the risks of running untrusted software that may exploit this vulnerability. 7. Employ least privilege principles to minimize the number of users and processes with access to the vulnerable driver. 8. Consider temporary disabling or uninstalling the affected anti-cheat driver if feasible until a patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6900f0e28b5ca1e4f6b448ef

Added to database: 10/28/2025, 4:35:46 PM

Last enriched: 1/31/2026, 7:57:12 AM

Last updated: 2/7/2026, 3:24:23 PM

Views: 172

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats