Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63602: n/a

0
High
VulnerabilityCVE-2025-63602cvecve-2025-63602
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability was discovered in Awesome Miner thru 11.2.4 that allows arbitrary read and write to kernel memory and MSRs (such as LSTAR) as an unprivileged user. This is due to the implementation of an insecure version of WinRing0 (1.2.0.5, renamed to IntelliBreeze.Maintenance.Service.sys) that lacks a properly secured DACL, allowing unprivileged users to interact with the driver and, as a result, the kernel. This can result in local privilege escalation, information disclosure, denial of service, and other unspecified impacts.

AI-Powered Analysis

AILast updated: 11/25/2025, 16:23:43 UTC

Technical Analysis

CVE-2025-63602 is a vulnerability identified in Awesome Miner software versions through 11.2.4, stemming from the use of an insecure version of the WinRing0 kernel driver (version 1.2.0.5), which has been renamed to IntelliBreeze.Maintenance.Service.sys within the product. The core issue lies in the driver's lack of a properly secured Discretionary Access Control List (DACL), which governs access permissions. This misconfiguration permits any unprivileged local user to interact directly with the driver, enabling arbitrary read and write operations to kernel memory and Model-Specific Registers (MSRs), such as the LSTAR register that controls system call entry points. This capability effectively allows an attacker to escalate privileges from a standard user to SYSTEM or kernel level, bypassing normal security boundaries. The vulnerability is classified under CWE-126 (Buffer Over-read), indicating that improper handling of memory boundaries contributes to the issue. The CVSS v3.1 base score is 7.3 (high), reflecting network attack vector with no privileges or user interaction required, and impacts on confidentiality, integrity, and availability. While no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized for local privilege escalation, information theft, or denial of service attacks. The lack of a patch link indicates that remediation may require vendor intervention or manual mitigation steps. Organizations using Awesome Miner, particularly in environments where multiple users have local access, are at risk of compromise if this vulnerability is exploited.

Potential Impact

For European organizations, the impact of CVE-2025-63602 can be severe, especially in sectors relying on Awesome Miner for cryptocurrency mining management or other operational tasks. Successful exploitation allows attackers to gain kernel-level privileges from an unprivileged account, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of mining operations or other critical services, and the ability to deploy persistent malware or ransomware. The vulnerability also poses a risk of denial of service, which could interrupt business continuity. Given the increasing regulatory scrutiny in Europe around data protection (e.g., GDPR) and operational resilience, exploitation could lead to significant legal and financial consequences. Organizations with shared or multi-user environments are particularly vulnerable, as any local user could escalate privileges. Additionally, the ability to manipulate kernel memory and MSRs could facilitate sophisticated attacks that evade detection and complicate incident response efforts.

Mitigation Recommendations

To mitigate CVE-2025-63602, European organizations should immediately assess their use of Awesome Miner and identify any installations running versions up to 11.2.4. Since no official patch is currently linked, organizations should consider the following specific actions: 1) Restrict local user access to systems running Awesome Miner to trusted personnel only, minimizing the risk of unprivileged exploitation. 2) Employ application whitelisting and endpoint protection solutions capable of detecting anomalous driver interactions or unauthorized kernel memory access. 3) Monitor system logs and kernel driver activity for unusual behavior indicative of exploitation attempts. 4) If feasible, disable or remove the vulnerable WinRing0/IntelliBreeze.Maintenance.Service.sys driver until a vendor patch is available, understanding this may impact functionality. 5) Engage with the vendor for updates or patches and apply them promptly once released. 6) Implement strict access controls and harden system configurations to reduce the attack surface. 7) Conduct user awareness training to prevent inadvertent local access by unauthorized users. These targeted measures go beyond generic advice by focusing on controlling local access and monitoring kernel-level interactions specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691c93529b9483ee9a6cccdf

Added to database: 11/18/2025, 3:40:02 PM

Last enriched: 11/25/2025, 4:23:43 PM

Last updated: 1/7/2026, 4:17:52 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats