Description

A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options parameter before copying data into a 40-byte stack buffer (Src[40]) using memmove. An attacker with local access can exploit this vulnerability by sending a crafted IOCTL request with Options > 40, causing a stack buffer overflow that may lead to kernel code execution, local privilege escalation, or denial of service (system crash). Additionally, the same IOCTL handler can leak kernel addresses and other sensitive stack data when reading beyond the buffer boundaries.

INFO

Published Date :

2026-03-05T00:00:00.000Z

Last Modified :

2026-03-06T10:01:31.522Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-70616 vulnerability.

Vendors Products
Dieboldnixdorf
  • Wnbios64.sys
Wincor
  • Nixdorf
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-70616.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact