POC详情: 0baf00fbf0255e29243a8581a5924942002f1772

来源
关联漏洞
标题: TechPowerUp ThrottleStop 安全漏洞 (CVE-2025-7771)
描述:TechPowerUp ThrottleStop是TechPowerUp公司的一款用于监控和调整CPU性能的软件。 TechPowerUp ThrottleStop 3.0.0.0版本存在安全漏洞,该漏洞源于允许物理内存读写,可能导致权限提升。
描述
ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrary kernel functions with ring-0 privileges.
介绍
# CVE-2025-7771 – ThrottleStop.sys Privilege Escalation

## Vulnerability Details
- **CVE ID**: CVE-2025-7771  
- **Component**: `ThrottleStop.sys` (legitimate driver)  
- **Affected Versions**: ThrottleStop 3.0.0.0 (and possibly others)  
- **Vulnerability Type**: Exposed IOCTL with Insufficient Access Control (CWE-782)  
- **Impact**: Local Privilege Escalation (LPE)  
- **CVSS Score**: 8.7 (High) – [Kaspersky Labs Assessment]  

### Description
The `ThrottleStop.sys` driver exposes two insecure IOCTL interfaces that allow arbitrary read and write access to physical memory via the `MmMapIoSpace` function.  
A malicious local user-mode application can abuse these IOCTLs to patch the running Windows kernel and invoke arbitrary kernel functions with **ring-0 privileges**.  
This enables privilege escalation and potential follow-on attacks such as:
- Disabling or tampering with security software  
- Bypassing kernel-level protections (e.g., PatchGuard, Driver Signature Enforcement)  
- Arbitrary code execution in kernel context  

---

## Exploit Concept
The exploit leverages `DeviceIoControl` calls against `ThrottleStop.sys` to:  
1. **Open Handle** → Gain access to `\\Device\\ThrottleStop` driver object.  
2. **Arbitrary Read/Write** → Use vulnerable IOCTLs to map kernel memory into user space.  
3. **Kernel Patch** → Modify kernel structures or function pointers.  
4. **Privilege Escalation** → Redirect execution to attacker-controlled shellcode.  

---

## Compilation & Usage
```bash
# Compile (example with MSVC)
cl exploit.c /DUNICODE /D_UNICODE /Wall /nologo /Fe:exploit.exe

# Run (must be executed locally on vulnerable system)
exploit.exe
```
>⚠️ Note: Proof-of-Concept (PoC) code should only be executed in controlled test environments such as a VM. Running it on production systems is dangerous.
```
+--------------------+
| User-mode process  |
+---------+----------+
          |
          v
+--------------------+        IOCTL Calls        +---------------------+
|  ThrottleStop.sys  | <-----------------------> | MmMapIoSpace Kernel |
|  (Insecure driver) |                          |  Arbitrary R/W      |
+---------+----------+                          +----------+----------+
          |                                                |
          v                                                v
   Arbitrary Kernel Patch ----------------------> Kernel Privilege Escalation
```
## Tested Platforms

- Windows 10 Pro x64 (build 19045) – vulnerable

- Windows 11 Pro x64 (build 22631) – vulnerable

- Other versions using ThrottleStop.sys 3.0.0.0 may also be affected.

## Recommendations

- ## Immediate Mitigation : Remove or disable the vulnerable ThrottleStop.sys driver if not required.

- ## Vendor Patch  : Apply updates from TechPowerUp once available.

- ## System Hardening: 

- Run with least privilege accounts where possible

- Monitor and block unsigned/unverified drivers

- Enable Kernel-mode Code Integrity (KMCI) enforcement



## Disclaimer

>This repository and documentation are provided for educational and defensive research purposes only.
Any use of the PoC to compromise systems without explicit authorization is illegal.

>The authors and contributors are not responsible for misuse or damage caused by this material.
文件快照

[4.0K] /data/pocs/0baf00fbf0255e29243a8581a5924942002f1772 ├── [ 92K] exploit.cpp └── [3.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。