CVE-2025-51060

An issue was discovered in CPUID cpuz.sys 1.0.5.4. An attacker can use DeviceIoControl with the unvalidated parameters 0x9C402440 and 0x9C402444 as IoControlCodes to perform RDMSR and WRMSR, respectively. Through this process, the attacker can modify MSR_LSTAR and hook KiSystemCall64. Afterward, using Return-Oriented Programming (ROP), the attacker can manipulate the stack with pre-prepared gadgets, disable the SMAP flag in the CR4 register, and execute a user-mode syscall handler in the kernel context. It has not been confirmed whether this works on 32-bit Windows, but it functions on 64-bit Windows if the core isolation feature is either absent or disabled.
Configurations

No configuration.

History

05 Aug 2025, 20:15

Type Values Removed Values Added
CWE CWE-284
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

05 Aug 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-05 18:15

Updated : 2025-08-05 21:06


NVD link : CVE-2025-51060

Mitre link : CVE-2025-51060

CVE.ORG link : CVE-2025-51060


JSON object : View

Products Affected

No product.

CWE
CWE-284

Improper Access Control