Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| http://ludashi.com |
|
| https://github.com/CDipper/CVE-Publication |
|
Thu, 15 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 CWE-732 |
|
| Metrics |
cvssV3_1
|
Thu, 15 Jan 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local information disclosure vulnerability exists in the Ludashi driver before 5.1025 due to a lack of access control in the IOCTL handler. This driver exposes a device interface accessible to a normal user and handles attacker-controlled structures containing the lower 4GB of physical addresses. The handler maps arbitrary physical memory via MmMapIoSpace and copies data back to user mode without verifying the caller's privileges or the target address range. This allows unprivileged users to read arbitrary physical memory, potentially exposing kernel data structures, kernel pointers, security tokens, and other sensitive information. This vulnerability can be further exploited to bypass the Kernel Address Space Layout Rules (KASLR) and achieve local privilege escalation. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-15T16:02:13.237Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67246
Updated: 2026-01-15T16:01:39.260Z
Status : Received
Published: 2026-01-15T16:16:12.450
Modified: 2026-01-15T17:16:05.490
Link: CVE-2025-67246
No data.
OpenCVE Enrichment
No data.