ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrary kernel functions with ring-0 privileges. The vulnerability enables local attackers to execute arbitrary code in kernel context, resulting in privilege escalation and potential follow-on attacks, such as disabling security software or bypassing kernel-level protections. ThrottleStop.sys version 3.0.0.0 and possibly others are affected. Apply updates per vendor instructions.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Techpowerup
Techpowerup throttlestop |
|
| Vendors & Products |
Techpowerup
Techpowerup throttlestop |
Wed, 06 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 Aug 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrary kernel functions with ring-0 privileges. The vulnerability enables local attackers to execute arbitrary code in kernel context, resulting in privilege escalation and potential follow-on attacks, such as disabling security software or bypassing kernel-level protections. ThrottleStop.sys version 3.0.0.0 and possibly others are affected. Apply updates per vendor instructions. | |
| Title | Code Execution / Escalation of Privileges in ThrottleStop | |
| Weaknesses | CWE-782 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Kaspersky
Published: 2025-08-06T09:35:00.684Z
Updated: 2025-08-06T20:25:31.602Z
Reserved: 2025-07-17T15:54:18.122Z
Link: CVE-2025-7771
Updated: 2025-08-06T20:25:27.017Z
Status : Awaiting Analysis
Published: 2025-08-06T10:15:35.597
Modified: 2025-08-06T20:23:37.600
Link: CVE-2025-7771
No data.