Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63602: n/a

0
High
VulnerabilityCVE-2025-63602cvecve-2025-63602
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability was discovered in Awesome Miner thru 11.2.4 that allows arbitrary read and write to kernel memory and MSRs (such as LSTAR) as an unprivileged user. This is due to the implementation of an insecure version of WinRing0 (1.2.0.5, renamed to IntelliBreeze.Maintenance.Service.sys) that lacks a properly secured DACL, allowing unprivileged users to interact with the driver and, as a result, the kernel. This can result in local privilege escalation, information disclosure, denial of service, and other unspecified impacts.

AI-Powered Analysis

AILast updated: 11/18/2025, 15:40:18 UTC

Technical Analysis

CVE-2025-63602 is a critical local privilege escalation vulnerability discovered in Awesome Miner software versions up to 11.2.4. The root cause is the inclusion of an insecure version of the WinRing0 driver (version 1.2.0.5), renamed as IntelliBreeze.Maintenance.Service.sys, which lacks a properly secured discretionary access control list (DACL). This misconfiguration allows any unprivileged user on the system to interact directly with the driver, enabling arbitrary read and write access to kernel memory and model-specific registers (MSRs) such as LSTAR, which controls system call entry points. By manipulating these kernel-level resources, an attacker can execute arbitrary code with kernel privileges, leading to local privilege escalation. The vulnerability can also cause information disclosure by reading sensitive kernel memory and denial of service by corrupting critical kernel structures. The lack of authentication or user interaction requirements means any local user can exploit this flaw. Although no known public exploits have been reported yet, the vulnerability is severe due to the direct kernel memory access it grants. The affected software is primarily used on Windows platforms, and the vulnerability is tied to the driver implementation within Awesome Miner. This flaw highlights the risks of including third-party drivers without proper security hardening and access controls.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially those using Awesome Miner for cryptocurrency mining or related IT operations. Successful exploitation allows attackers with local access to escalate privileges to SYSTEM or kernel level, potentially bypassing security controls and gaining full control over affected machines. This can lead to theft of sensitive data, deployment of persistent malware, disruption of mining operations, or broader network compromise if lateral movement is achieved. Information disclosure risks may expose confidential kernel memory contents, aiding further attacks. Denial of service impacts could disrupt critical infrastructure or business continuity. Organizations with shared or multi-user environments, such as mining farms or managed service providers, are particularly vulnerable. The absence of known exploits currently reduces immediate risk, but the vulnerability’s nature makes it a prime target for attackers seeking local privilege escalation on Windows systems.

Mitigation Recommendations

To mitigate CVE-2025-63602, European organizations should immediately audit their use of Awesome Miner software and identify any installations running versions up to 11.2.4. Since no official patch or update links are provided, organizations should contact the vendor for a secure update or guidance on replacing the vulnerable WinRing0 driver with a properly secured version. Restrict local user permissions to prevent untrusted users from accessing or interacting with the driver. Employ application whitelisting and endpoint detection to monitor for suspicious driver interactions or kernel memory access attempts. Consider isolating mining operations on dedicated, hardened systems with minimal user access. Regularly review and harden discretionary access control lists (DACLs) on kernel drivers and services. Implement robust logging and alerting for privilege escalation attempts. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691c93529b9483ee9a6cccdf

Added to database: 11/18/2025, 3:40:02 PM

Last enriched: 11/18/2025, 3:40:18 PM

Last updated: 11/19/2025, 3:55:29 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats