Description

A local information disclosure vulnerability exists in the Ludashi driver before 5.1025 due to a lack of access control in the IOCTL handler. This driver exposes a device interface accessible to a normal user and handles attacker-controlled structures containing the lower 4GB of physical addresses. The handler maps arbitrary physical memory via MmMapIoSpace and copies data back to user mode without verifying the caller's privileges or the target address range. This allows unprivileged users to read arbitrary physical memory, potentially exposing kernel data structures, kernel pointers, security tokens, and other sensitive information. This vulnerability can be further exploited to bypass the Kernel Address Space Layout Rules (KASLR) and achieve local privilege escalation.

INFO

Published Date :

2026-01-15T00:00:00.000Z

Last Modified :

2026-01-15T16:02:13.237Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-67246 vulnerability.

Vendors Products
Ludashi
  • Driver
  • Ludashi Driver
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-67246.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact