ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrary kernel functions with ring-0 privileges. The vulnerability enables local attackers to execute arbitrary code in kernel context, resulting in privilege escalation and potential follow-on attacks, such as disabling security software or bypassing kernel-level protections. ThrottleStop.sys version 3.0.0.0 and possibly others are affected. Apply updates per vendor instructions.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Aug 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrary kernel functions with ring-0 privileges. The vulnerability enables local attackers to execute arbitrary code in kernel context, resulting in privilege escalation and potential follow-on attacks, such as disabling security software or bypassing kernel-level protections. ThrottleStop.sys version 3.0.0.0 and possibly others are affected. Apply updates per vendor instructions. | |
Title | Code Execution / Escalation of Privileges in ThrottleStop | |
Weaknesses | CWE-782 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Kaspersky
Published: 2025-08-06T09:35:00.684Z
Updated: 2025-08-06T09:35:00.684Z
Reserved: 2025-07-17T15:54:18.122Z
Link: CVE-2025-7771

No data.

Status : Received
Published: 2025-08-06T10:15:35.597
Modified: 2025-08-06T10:15:35.597
Link: CVE-2025-7771

No data.