CVE-2024-10972

Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD with a parallel thread changing the memory’s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the userspace to change page permissions half way through the routine.  A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations.
Configurations

No configuration.

History

05 Sep 2025, 09:15

Type Values Removed Values Added
CWE CWE-20 CWE-367
Summary
  • (es) Las versiones 4.1 y anteriores de Velocidex WinPmem sufren una vulnerabilidad de validación de entrada incorrecta mediante la cual un atacante con acceso de administrador puede generar un BSOD con un subproceso paralelo que cambia el derecho de acceso a la memoria bajo el control de la aplicación en modo de usuario. Esto se debe a que la verificación solo se realiza al comienzo de la rutina, lo que permite que el espacio de usuario cambie los permisos de la página a mitad de la rutina. Un workaround válida es una regla para detectar la carga no autorizada de winpmem fuera de las operaciones de respuesta a incidentes.

16 Dec 2024, 16:15

Type Values Removed Values Added
Summary (en) Velocidex WinPmem versions below 4.1 suffer from an Improper Input Validation vulnerability whereby an attacker can directly communicate with the driver by accessing the \"\\\\.\\pmem\" device. From that point, it is possible to communicate with the driver via regular device operations, starting with a system of IOCTLs. To send specific orders to the driver, one can use IRP_MJ_DEVICE_CONTROL control code. This issue is remediated in version 4.1. (en) Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD with a parallel thread changing the memory’s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the userspace to change page permissions half way through the routine.  A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations.

16 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-16 15:15

Updated : 2025-09-05 09:15


NVD link : CVE-2024-10972

Mitre link : CVE-2024-10972

CVE.ORG link : CVE-2024-10972


JSON object : View

Products Affected

No product.

CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition