Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65264: n/a

0
Medium
VulnerabilityCVE-2025-65264cvecve-2025-65264
Published: Tue Jan 27 2026 (01/27/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

The kernel driver of CPUID CPU-Z v2.17 and earlier does not validate user-supplied values passed via its IOCTL interface, allowing an attacker to access sensitive information via a crafted request.

AI-Powered Analysis

AILast updated: 01/27/2026, 17:21:09 UTC

Technical Analysis

CVE-2025-65264 is a security vulnerability identified in the kernel driver component of CPUID CPU-Z version 2.17 and earlier. The issue arises because the driver does not validate user-supplied values passed via its IOCTL (Input/Output Control) interface. IOCTL interfaces allow user-mode applications to communicate with kernel-mode drivers, often requiring strict validation to prevent unauthorized access or manipulation. In this case, the lack of validation enables an attacker to craft malicious IOCTL requests that can bypass normal security checks and access sensitive information stored or processed by the driver. Since CPU-Z is a popular system profiling tool used to gather detailed information about CPU, memory, and other hardware components, the vulnerability could expose sensitive system details that might aid further attacks or information leakage. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. No CVSS score has been assigned yet, and no patches or known exploits are currently reported. However, the flaw's nature suggests it could be exploited locally by an attacker with access to the affected system to escalate privileges or extract sensitive data. The vulnerability highlights the importance of input validation in kernel drivers, especially those interfacing with user-mode applications.

Potential Impact

For European organizations, the primary impact of CVE-2025-65264 is the potential unauthorized disclosure of sensitive system information, which could facilitate further targeted attacks or privilege escalation. Organizations relying on CPU-Z for hardware diagnostics, asset management, or performance monitoring may inadvertently expose critical system details to malicious actors with local access. This could compromise confidentiality and potentially integrity if attackers leverage the information to exploit other vulnerabilities. The vulnerability could affect sectors with high reliance on hardware profiling tools, such as financial institutions, government agencies, and technology companies. Additionally, the exposure of sensitive hardware details could aid attackers in crafting more effective attacks against critical infrastructure or intellectual property. Although no remote exploitation is indicated, insider threats or attackers with initial footholds could exploit this vulnerability to deepen their access. The lack of patches increases the window of exposure, emphasizing the need for proactive mitigation.

Mitigation Recommendations

European organizations should immediately audit their use of CPU-Z, especially versions 2.17 and earlier, and restrict access to systems running vulnerable versions to trusted personnel only. Implement strict access controls and monitoring on endpoints where CPU-Z is installed to detect unusual IOCTL requests or suspicious activity. Employ application whitelisting and endpoint detection and response (EDR) solutions to identify and block attempts to exploit the IOCTL interface. Until an official patch is released, consider disabling or uninstalling CPU-Z on critical systems where possible. If CPU-Z usage is essential, run it in isolated environments or virtual machines to contain potential exploitation. Engage with CPUID for timely updates and patches, and apply them promptly once available. Additionally, conduct regular security training to raise awareness about the risks of local exploitation and the importance of limiting administrative privileges. Network segmentation can further reduce the risk of lateral movement by attackers exploiting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6978f0754623b1157c38c52b

Added to database: 1/27/2026, 5:05:57 PM

Last enriched: 1/27/2026, 5:21:09 PM

Last updated: 2/4/2026, 3:52:56 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats