CVE-2025-65001

8.2 HIGH

📋 TL;DR

This vulnerability in Fujitsu fbiosdrv.sys driver allows attackers to write beyond allocated memory boundaries, potentially leading to privilege escalation, system crashes, or arbitrary code execution. It affects systems running vulnerable versions of Fujitsu BIOS driver software. The high CVSS score indicates significant security impact.

💻 Affected Systems

Products:
  • Fujitsu fbiosdrv.sys driver
Versions: Versions before 2.5.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Fujitsu systems with vulnerable driver versions installed; driver typically comes pre-installed on Fujitsu hardware.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level privilege escalation, allowing attackers to install persistent malware, steal sensitive data, or render systems inoperable.

🟠

Likely Case

Local privilege escalation enabling attackers to gain administrative rights on compromised systems, potentially leading to lateral movement within networks.

🟢

If Mitigated

Limited impact with proper access controls, but still presents risk of denial-of-service or limited privilege escalation if exploited.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to system; exploitation involves memory corruption techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.0.0 or later

Vendor Advisory: https://security.ts.fujitsu.com/ProductSecurity/content/FsasTech-PSIRT-FTI-FCCL-2025-072319-Security-Notice.pdf

Restart Required: Yes

Instructions:

1. Download updated driver from Fujitsu support portal. 2. Install the update. 3. Restart system to complete installation.

🔧 Temporary Workarounds

Driver Removal

windows

Remove vulnerable fbiosdrv.sys driver if not required for system functionality

sc stop fbiosdrv
sc delete fbiosdrv
del C:\Windows\System32\drivers\fbiosdrv.sys

Access Restriction

windows

Restrict access to driver using Windows security policies

icacls C:\Windows\System32\drivers\fbiosdrv.sys /deny *S-1-1-0:(RX)

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor for unusual driver activity or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under System devices or run: powershell Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*fbiosdrv*'} | Select-Object DeviceName, DriverVersion

Check Version:

powershell Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*fbiosdrv*'} | Select-Object DriverVersion

Verify Fix Applied:

Verify driver version is 2.5.0.0 or higher using same command

📡 Detection & Monitoring

Log Indicators:

  • Unexpected driver loads or crashes in System logs
  • Privilege escalation events in Security logs
  • Driver-related errors in Application logs

Network Indicators:

  • Unusual outbound connections following local privilege escalation
  • Lateral movement attempts from affected systems

SIEM Query:

EventID=7036 AND (ServiceName='fbiosdrv' OR ServiceName LIKE '%fbios%') OR EventID=4624 AND PrivilegeList LIKE '%SeDebugPrivilege%'

🔗 References

📤 Share & Export