CVE-2025-51060

6.5 MEDIUM

📋 TL;DR

This vulnerability in CPUID cpuz.sys driver allows attackers to execute arbitrary code with kernel privileges by exploiting unvalidated DeviceIoControl parameters. It enables MSR manipulation to hook system calls and bypass security mechanisms like SMAP. Affected users are those running CPUID software with the vulnerable driver on 64-bit Windows systems without core isolation.

💻 Affected Systems

Products:
  • CPUID cpuz.sys driver
Versions: 1.0.5.4
Operating Systems: Windows 64-bit
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access; core isolation feature must be absent or disabled for exploitation on 64-bit Windows. 32-bit Windows impact unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level code execution, allowing attackers to install persistent malware, steal credentials, and bypass all security controls.

🟠

Likely Case

Privilege escalation from user to kernel mode, enabling installation of rootkits, disabling security software, and accessing protected system resources.

🟢

If Mitigated

Limited impact if core isolation is enabled and properly configured, as this prevents exploitation according to the description.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of ROP techniques. Proof-of-concept code may exist in referenced GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor for updated version

Vendor Advisory: http://cpuid.com

Restart Required: No

Instructions:

1. Visit CPUID website for updates. 2. Download and install latest version. 3. Verify cpuz.sys driver is updated. 4. Consider removing unnecessary driver if not needed.

🔧 Temporary Workarounds

Enable Core Isolation

Windows 10/11

Enable Windows Security Core Isolation feature to prevent exploitation

Windows Security → Device Security → Core Isolation Details → Enable Memory Integrity

Remove/Disable Driver

Windows

Uninstall CPUID software or disable the cpuz.sys driver if not required

sc stop cpuz
sc delete cpuz
Remove via Programs and Features

🧯 If You Can't Patch

  • Enable Windows Defender Application Control to block unauthorized drivers
  • Implement least privilege principles and restrict local access to sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check driver version: Get-ItemProperty 'HKLM:\SYSTEM\CurrentControlSet\Services\cpuz' | Select-Object ImagePath

Check Version:

driverquery /v | findstr cpuz

Verify Fix Applied:

Verify driver version is updated or driver is removed from system

📡 Detection & Monitoring

Log Indicators:

  • DeviceIoControl calls with IoControlCodes 0x9C402440 or 0x9C402444
  • Unexpected MSR access attempts
  • Driver loading events for cpuz.sys

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4656 OR EventID=4663 AND ObjectName LIKE '%cpuz.sys%' OR ProcessName='DeviceIoControl' AND IoControlCode IN ('0x9C402440', '0x9C402444')

🔗 References

📤 Share & Export