CVE-2025-60349

7.5 HIGH

📋 TL;DR

This vulnerability in Prevx v3.0.5.220 allows attackers to cause denial of service by sending a specific IOCTL code to the pxscan.sys driver, which terminates processes listed in a specific registry key. It affects systems running the vulnerable version of Prevx antivirus software. The attack requires local access to the system.

💻 Affected Systems

Products:
  • Prevx
Versions: v3.0.5.220
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the pxscan.sys driver loaded and the specific registry key populated with process names.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical system processes could be terminated, causing complete system instability or crash, potentially requiring reboot and disrupting business operations.

🟠

Likely Case

Targeted termination of security or application processes, disrupting specific services while the system remains operational.

🟢

If Mitigated

Limited impact if registry key contains only non-critical processes or if access controls prevent unauthorized users from sending IOCTL commands.

🌐 Internet-Facing: LOW - This vulnerability requires local system access and cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised accounts with local access could exploit this to disrupt services on affected systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on GitHub. Requires local system access and ability to send IOCTL commands to the driver.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://prevx.com

Restart Required: No

Instructions:

Check vendor website for updates. Since Prevx appears to be discontinued, consider migrating to alternative security software.

🔧 Temporary Workarounds

Restrict registry key permissions

windows

Modify permissions on the vulnerable registry key to prevent unauthorized modifications

reg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\pxscan" /v Files /t REG_SZ /d "" /f

Remove vulnerable driver

windows

Uninstall or disable the pxscan.sys driver

sc stop pxscan
sc delete pxscan

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to affected systems
  • Monitor for IOCTL calls with code 0x22E044 to the pxscan.sys driver

🔍 How to Verify

Check if Vulnerable:

Check if pxscan.sys driver version is 3.0.5.220 and registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\pxscan\Files exists

Check Version:

driverquery /v | findstr pxscan

Verify Fix Applied:

Verify pxscan.sys driver is removed or updated, and registry key is empty or removed

📡 Detection & Monitoring

Log Indicators:

  • Driver load events for pxscan.sys
  • Process termination events for processes listed in the registry key

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=4688 AND ProcessName="*pxscan*" OR EventID=4689 AND ProcessName IN (registry key process list)

🔗 References

📤 Share & Export