CVE-2025-67246

A local information disclosure vulnerability exists in the Ludashi driver before 5.1025 due to a lack of access control in the IOCTL handler. This driver exposes a device interface accessible to a normal user and handles attacker-controlled structures containing the lower 4GB of physical addresses. The handler maps arbitrary physical memory via MmMapIoSpace and copies data back to user mode without verifying the caller's privileges or the target address range. This allows unprivileged users to read arbitrary physical memory, potentially exposing kernel data structures, kernel pointers, security tokens, and other sensitive information. This vulnerability can be further exploited to bypass the Kernel Address Space Layout Rules (KASLR) and achieve local privilege escalation.
References
Link Resource
http://ludashi.com Product
https://github.com/CDipper/CVE-Publication Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ludashi:ludashi_driver:*:*:*:*:*:*:*:*

History

23 Jan 2026, 18:03

Type Values Removed Values Added
CPE cpe:2.3:a:ludashi:ludashi_driver:*:*:*:*:*:*:*:*
References () http://ludashi.com - () http://ludashi.com - Product
References () https://github.com/CDipper/CVE-Publication - () https://github.com/CDipper/CVE-Publication - Exploit, Third Party Advisory
First Time Ludashi ludashi Driver
Ludashi

15 Jan 2026, 17:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
CWE CWE-269
CWE-732

15 Jan 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-15 16:16

Updated : 2026-01-23 18:03


NVD link : CVE-2025-67246

Mitre link : CVE-2025-67246

CVE.ORG link : CVE-2025-67246


JSON object : View

Products Affected

ludashi

  • ludashi_driver
CWE
CWE-269

Improper Privilege Management

CWE-732

Incorrect Permission Assignment for Critical Resource