An issue was discovered in CPUID cpuz.sys 1.0.5.4. An attacker can use DeviceIoControl with the unvalidated parameters 0x9C402440 and 0x9C402444 as IoControlCodes to perform RDMSR and WRMSR, respectively. Through this process, the attacker can modify MSR_LSTAR and hook KiSystemCall64. Afterward, using Return-Oriented Programming (ROP), the attacker can manipulate the stack with pre-prepared gadgets, disable the SMAP flag in the CR4 register, and execute a user-mode syscall handler in the kernel context. It has not been confirmed whether this works on 32-bit Windows, but it functions on 64-bit Windows if the core isolation feature is either absent or disabled.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| http://cpuid.com |     | 
| http://cpuzsys.com |     | 
| https://github.com/ZiaLib/Zmsr |     | 
History
                    Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Cpuid cpuz.sys | |
| CPEs | cpe:2.3:a:cpuid:cpuz.sys:1.0.5.4:*:*:*:*:windows:*:* | |
| Vendors & Products | Cpuid cpuz.sys | 
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Cpuid Cpuid cpu-z Microsoft Microsoft windows | |
| Vendors & Products | Cpuid Cpuid cpu-z Microsoft Microsoft windows | 
Tue, 05 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics | cvssV3_1 
 
 | 
Tue, 05 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An issue was discovered in CPUID cpuz.sys 1.0.5.4. An attacker can use DeviceIoControl with the unvalidated parameters 0x9C402440 and 0x9C402444 as IoControlCodes to perform RDMSR and WRMSR, respectively. Through this process, the attacker can modify MSR_LSTAR and hook KiSystemCall64. Afterward, using Return-Oriented Programming (ROP), the attacker can manipulate the stack with pre-prepared gadgets, disable the SMAP flag in the CR4 register, and execute a user-mode syscall handler in the kernel context. It has not been confirmed whether this works on 32-bit Windows, but it functions on 64-bit Windows if the core isolation feature is either absent or disabled. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2025-08-05T00:00:00.000Z
Updated: 2025-08-05T20:07:46.012Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51060
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-05T20:07:41.079Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-08-05T18:15:32.220
Modified: 2025-10-09T17:33:57.897
Link: CVE-2025-51060
 Redhat
                        Redhat
                    No data.