Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23763: CWE-668 Exposure of Resource to Wrong Sphere in VB-Audio Software Matrix

0
High
VulnerabilityCVE-2026-23763cvecve-2026-23763cwe-668
Published: Thu Jan 22 2026 (01/22/2026, 16:17:12 UTC)
Source: CVE Database V5
Vendor/Project: VB-Audio Software
Product: Matrix

Description

VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a local privilege escalation vulnerability in the VBMatrix VAIO virtual audio driver (vbmatrixvaio64*_win10.sys). The driver allocates a 128-byte non-paged pool buffer and, upon receiving IOCTL 0x222060, maps it into user space using an MDL and MmMapLockedPagesSpecifyCache. Because the allocation size is not page-aligned, the mapping exposes the entire 0x1000-byte kernel page containing the buffer plus adjacent non-paged pool allocations with read/write permissions. An unprivileged local attacker can open a device handle (using the required 0x800 attribute flag), invoke the IOCTL to obtain the mapping, and then read or modify live kernel objects and pointers present on that page. This enables bypass of KASLR, arbitrary kernel memory read/write within the exposed page, corruption of kernel objects, and escalation to SYSTEM.

AI-Powered Analysis

AILast updated: 01/22/2026, 16:50:42 UTC

Technical Analysis

CVE-2026-23763 is a high-severity local privilege escalation vulnerability found in VB-Audio Software's Matrix and Matrix Coconut products, specifically in the VBMatrix VAIO virtual audio driver (vbmatrixvaio64*_win10.sys). The vulnerability stems from the driver's handling of a 128-byte non-paged pool buffer allocated in kernel memory. When the driver receives the IOCTL code 0x222060, it maps this buffer into user space using an MDL (Memory Descriptor List) and the MmMapLockedPagesSpecifyCache function. However, because the buffer size is not aligned to the system's page size (0x1000 bytes), the mapping inadvertently exposes the entire 4KB kernel page containing the buffer plus adjacent non-paged pool allocations. This mapping grants read and write permissions to user-mode processes, which should never have direct access to kernel memory. An unprivileged local attacker can open a device handle with the required 0x800 attribute flag and invoke the IOCTL to obtain this mapping. This access allows the attacker to read and modify live kernel objects and pointers within the exposed page, effectively bypassing Kernel Address Space Layout Randomization (KASLR). The attacker can corrupt kernel structures and escalate privileges to SYSTEM level, gaining full control over the affected machine. The vulnerability does not require user interaction but does require local access and the ability to open the device handle. The CVSS v4.0 score is 8.5, reflecting high impact on confidentiality, integrity, and availability with relatively low attack complexity. No public exploits have been reported yet, but the flaw's nature makes it a critical target for attackers seeking local privilege escalation on Windows 10 systems running these audio drivers.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where VB-Audio Matrix or Matrix Coconut products are deployed on Windows 10 endpoints. Successful exploitation allows attackers with local access to escalate privileges to SYSTEM, potentially leading to full system compromise, data theft, or disruption of services. This is particularly concerning for organizations handling sensitive data, critical infrastructure, or regulated industries such as finance, healthcare, and government. The ability to bypass KASLR and manipulate kernel memory undermines many security controls, increasing the likelihood of persistent and stealthy attacks. Since the vulnerability requires local access, it may be exploited by insiders or through initial footholds gained via other attack vectors. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. European organizations with stringent endpoint security policies and monitoring may detect exploitation attempts, but those lacking such controls are at higher risk.

Mitigation Recommendations

1. Monitor VB-Audio Software advisories and apply vendor patches promptly once released to address this vulnerability. 2. Restrict local access to devices exposing the VBMatrix VAIO virtual audio driver, limiting who can open device handles with the 0x800 attribute flag. 3. Implement strict endpoint security controls, including application whitelisting and least privilege policies, to reduce the risk of local attacker footholds. 4. Employ kernel integrity monitoring and behavior-based detection tools to identify anomalous kernel memory access or manipulation attempts. 5. Conduct regular audits of installed audio drivers and software versions across the enterprise to identify vulnerable systems. 6. Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of timely updates. 7. Consider network segmentation and endpoint isolation strategies to contain potential compromises resulting from local exploits. 8. Use Windows security features such as Credential Guard and virtualization-based security to add layers of protection against kernel-level attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-15T18:42:20.939Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697251f54623b1157c7bcf96

Added to database: 1/22/2026, 4:36:05 PM

Last enriched: 1/22/2026, 4:50:42 PM

Last updated: 2/7/2026, 11:33:41 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats