CVE-2025-67246

7.3 HIGH

📋 TL;DR

This vulnerability allows unprivileged local users to read arbitrary physical memory through the Ludashi driver's IOCTL handler, exposing sensitive kernel data and potentially enabling privilege escalation. It affects systems running vulnerable versions of the Ludashi driver. Attackers with local access can exploit this to bypass security mechanisms like KASLR.

💻 Affected Systems

Products:
  • Ludashi driver
Versions: All versions before 5.1025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the driver's IOCTL handler which is accessible to normal users by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through local privilege escalation leading to full administrative control, credential theft, and persistent backdoor installation.

🟠

Likely Case

Information disclosure of kernel memory contents including security tokens, passwords, and encryption keys, enabling further attacks.

🟢

If Mitigated

Limited impact with proper access controls preventing unprivileged users from executing code or accessing sensitive systems.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring local system access, not directly exploitable over the network.
🏢 Internal Only: HIGH - Any user with local access to a vulnerable system can exploit this vulnerability to read sensitive memory contents.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but the vulnerability is straightforward to exploit once access is obtained. Public PoC exists in the GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1025 or later

Vendor Advisory: http://ludashi.com

Restart Required: Yes

Instructions:

1. Visit http://ludashi.com 2. Download latest Ludashi driver version 5.1025 or newer 3. Install the updated driver 4. Restart the system

🔧 Temporary Workarounds

Remove or disable Ludashi driver

windows

Uninstall the Ludashi software or disable the driver to prevent exploitation

sc stop LudashiDriver
sc delete LudashiDriver

Restrict driver access

windows

Modify driver permissions to prevent normal users from accessing the vulnerable IOCTL interface

icacls "C:\Windows\System32\drivers\Ludashi.sys" /deny Users:(R,X)

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to vulnerable systems
  • Monitor for suspicious driver access attempts and memory reading activities

🔍 How to Verify

Check if Vulnerable:

Check Ludashi driver version in Device Manager or using 'driverquery | findstr Ludashi' command

Check Version:

driverquery | findstr Ludashi

Verify Fix Applied:

Verify driver version is 5.1025 or later and test with public PoC to confirm memory reading is prevented

📡 Detection & Monitoring

Log Indicators:

  • Unusual driver access attempts by non-privileged users
  • Multiple IOCTL calls to Ludashi driver from user processes

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

EventID=4656 OR EventID=4663 WHERE ObjectName contains "Ludashi" AND SubjectUserName not in (Administrators)

🔗 References

📤 Share & Export