Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68947: CWE-862 Missing Authorization in NSecsoft NSecKrnl

0
Medium
VulnerabilityCVE-2025-68947cvecve-2025-68947cwe-862
Published: Tue Jan 13 2026 (01/13/2026, 21:19:55 UTC)
Source: CVE Database V5
Vendor/Project: NSecsoft
Product: NSecKrnl

Description

CVE-2025-68947 is a medium severity vulnerability in the NSecsoft NSecKrnl Windows driver that allows a local, authenticated attacker with low privileges to terminate processes owned by other users, including SYSTEM and Protected Processes. This is due to missing authorization checks in the driver’s IOCTL interface, enabling privilege escalation through process termination. Exploitation requires local access and no user interaction but has high attack complexity. The vulnerability impacts system availability by potentially disrupting critical processes. No known exploits are currently reported in the wild. European organizations using NSecKrnl, especially in Germany, France, and the UK, are at higher risk due to market presence and critical infrastructure reliance. Mitigation involves applying vendor patches when available, restricting local access, and monitoring for suspicious IOCTL activity. The CVSS score is 4. 7, reflecting medium severity.

AI-Powered Analysis

AILast updated: 02/06/2026, 07:59:56 UTC

Technical Analysis

CVE-2025-68947 is a vulnerability classified under CWE-862 (Missing Authorization) found in the NSecsoft NSecKrnl Windows kernel-mode driver. The flaw arises because the driver fails to properly enforce authorization checks on IOCTL requests that control process termination. As a result, a local attacker with low privileges but authenticated access to the system can craft specific IOCTL requests to terminate processes owned by other users, including highly privileged SYSTEM processes and Protected Processes that are normally safeguarded by the operating system. This capability effectively allows privilege escalation by disrupting critical system components, impacting system availability and stability. Exploitation does not require user interaction but demands local access and has a high attack complexity, limiting remote or automated exploitation. The vulnerability affects all versions of NSecKrnl prior to patching. Although no public exploits have been observed, the potential for denial-of-service or privilege escalation attacks is significant. The CVSS v3.1 score of 4.7 reflects the medium severity, driven by the high impact on availability but limited by the need for local access and complex exploitation. The vulnerability is particularly concerning for environments heavily reliant on NSecsoft products, especially in sectors where system uptime and process integrity are critical.

Potential Impact

For European organizations, the primary impact of CVE-2025-68947 is on system availability and operational continuity. Attackers exploiting this vulnerability can terminate critical system and protected processes, potentially causing system crashes, service outages, or denial of service conditions. This can disrupt business operations, especially in sectors such as finance, healthcare, energy, and government services that depend on high availability and secure Windows environments. The ability to terminate SYSTEM-level processes also raises the risk of privilege escalation, which could be leveraged for further attacks or lateral movement within networks. Given the requirement for local access, insider threats or compromised endpoints pose the greatest risk. The absence of known exploits currently reduces immediate threat but does not eliminate the risk of future exploitation. European organizations using NSecKrnl must consider the vulnerability in their risk assessments, particularly those with critical infrastructure or sensitive data.

Mitigation Recommendations

1. Apply vendor patches promptly once they become available to address the missing authorization checks in NSecKrnl. 2. Restrict local access to systems running NSecKrnl by enforcing strict access controls, limiting user privileges, and using endpoint protection to detect unauthorized access attempts. 3. Monitor IOCTL request activity for anomalies or suspicious patterns that could indicate exploitation attempts, using kernel-level monitoring tools or endpoint detection and response (EDR) solutions. 4. Implement strict user account management and session controls to reduce the risk of unauthorized local access. 5. Conduct regular security audits and vulnerability assessments focused on kernel drivers and local privilege escalation vectors. 6. Educate system administrators and security teams about the vulnerability and signs of exploitation to improve detection and response readiness. 7. Consider network segmentation and endpoint isolation strategies to limit the impact of compromised local accounts.

Affected Countries

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2025-12-26T16:17:37.928Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966b887a60475309fb6f589

Added to database: 1/13/2026, 9:26:31 PM

Last enriched: 2/6/2026, 7:59:56 AM

Last updated: 2/7/2026, 7:54:55 AM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats