Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23762: CWE-755 Improper Handling of Exceptional Conditions in VB-Audio Software Voicemeeter (Standard)

0
Medium
VulnerabilityCVE-2026-23762cvecve-2026-23762cwe-755
Published: Thu Jan 22 2026 (01/22/2026, 16:17:31 UTC)
Source: CVE Database V5
Vendor/Project: VB-Audio Software
Product: Voicemeeter (Standard)

Description

VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys). The drivers map non-paged pool memory into user space via MmMapLockedPagesSpecifyCache using UserMode access without proper exception handling. If the mapping fails, such as when a process has exhausted available virtual address space, MmMapLockedPagesSpecifyCache raises an exception that is not caught, causing a kernel crash (BSoD), typically SYSTEM_SERVICE_EXCEPTION with STATUS_NO_MEMORY. This flaw allows a local unprivileged user to trigger a denial-of-service on affected Windows systems.

AI-Powered Analysis

AILast updated: 01/22/2026, 16:51:44 UTC

Technical Analysis

CVE-2026-23762 is a vulnerability classified under CWE-755 (Improper Handling of Exceptional Conditions) found in VB-Audio Software's Voicemeeter (Standard, Banana, Potato) and Matrix products. The issue resides in their virtual audio drivers (e.g., vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys) which use the Windows kernel function MmMapLockedPagesSpecifyCache to map non-paged pool memory into user mode address space. This function can raise exceptions if the process has exhausted its available virtual address space. The drivers fail to properly catch these exceptions, leading to an unhandled exception that causes a kernel crash (Blue Screen of Death) with the error SYSTEM_SERVICE_EXCEPTION and STATUS_NO_MEMORY. This results in a denial-of-service condition that can be triggered by any local unprivileged user without requiring authentication or user interaction. The vulnerability affects versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 for Voicemeeter products and 1.0.2.2 and 2.0.2.2 for Matrix products and earlier. The CVSS 4.0 base score is 6.9, reflecting a medium severity due to local attack vector and no privilege or user interaction requirements. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The flaw primarily threatens system stability by enabling local denial-of-service attacks that crash the Windows kernel, potentially disrupting audio services and other dependent applications.

Potential Impact

For European organizations, the primary impact of CVE-2026-23762 is the risk of local denial-of-service attacks causing system crashes and service interruptions. Organizations relying on VB-Audio's Voicemeeter and Matrix software for audio routing, mixing, or broadcasting—such as media companies, broadcasters, content creators, and call centers—may experience operational disruptions. The kernel crashes could lead to downtime, loss of productivity, and potential data loss if systems are not properly backed up or if crashes occur during critical operations. Although the vulnerability does not allow privilege escalation or remote code execution, the ability for any local user to trigger a system crash without authentication poses a risk in multi-user environments or shared workstations. This could be exploited by malicious insiders or through compromised local accounts. The lack of user interaction requirement increases the risk in automated or unattended systems. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. Organizations with strict uptime requirements or those operating in regulated sectors may face compliance and reputational risks if disruptions occur.

Mitigation Recommendations

1. Restrict local user access on systems running affected VB-Audio software to trusted personnel only, minimizing the risk of malicious or accidental triggering of the vulnerability. 2. Monitor system logs and Windows Event Viewer for signs of SYSTEM_SERVICE_EXCEPTION or STATUS_NO_MEMORY Blue Screen errors that may indicate exploitation attempts. 3. Implement application whitelisting and endpoint protection to detect and prevent unauthorized execution of suspicious processes that might trigger the flaw. 4. Isolate critical audio processing systems from general user environments to reduce exposure to unprivileged users. 5. Regularly back up system and configuration data to enable rapid recovery from crashes. 6. Engage with VB-Audio Software for updates and apply patches promptly once released. 7. Consider deploying virtualization or sandboxing techniques for audio processing applications to contain potential crashes. 8. Educate local users about the risks of running untrusted code or scripts that could exploit local vulnerabilities. 9. Review and harden system memory and resource limits to prevent exhaustion scenarios that trigger the exception. 10. Coordinate with IT and security teams to develop incident response plans specific to denial-of-service conditions caused by kernel crashes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-15T18:42:20.939Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697251f54623b1157c7bcf8f

Added to database: 1/22/2026, 4:36:05 PM

Last enriched: 1/22/2026, 4:51:44 PM

Last updated: 2/6/2026, 2:56:26 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats