Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation

Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation

Posted on December 29, 2025December 29, 2025 By CWS

Safety researchers are more and more specializing in privilege escalation assaults via two major Home windows assault surfaces: kernel drivers and named pipes.

These vectors exploit elementary belief boundary weaknesses between the person and kernel modes. Enabling attackers to escalate from commonplace person privileges to SYSTEM-level entry.

Kernel drivers current a big LPE assault floor as a consequence of inadequate enter validation in IOCTL (I/O Management) processing routines.

Extracted recordsdata have been moved appropriately to the evaluation listing

In WDM-based drivers utilizing METHOD_BUFFERED mode, the I/O Supervisor allocates kernel buffers. Nevertheless, he fails to validate user-supplied information earlier than kernel processing.

This creates a important hole that permits attackers to craft malicious IOCTL requests containing pointer and size values that the kernel interprets inside its handle area.

The exploitation chain entails three key phases:

PhaseDescription1. System DiscoveryIdentify uncovered system names accessible from person mode2. IOCTL AnalysisAnalyze IOCTL dispatch routines utilizing reverse-engineering instruments similar to IDA Pro3. Vulnerability IdentificationLocate enter validation flaws enabling exploitation

By mapping person enter on to harmful kernel capabilities like MmMapIoSpace, attackers set up arbitrary learn/write primitives.

These primitives allow token theft assaults, studying the SYSTEM course of token and writing it to the present course of’s EPROCESS construction to attain privilege escalation.

 Vulnerability exploited

Named Pipe Assault Floor

Named pipes, generally used for inter-process communication by high-privilege SYSTEM companies, current an equally harmful vector.

In contrast to kernel drivers, named pipes function by way of message-based protocols somewhat than direct reminiscence entry, but they’re usually implicitly trusted by service functions.

Attackers can exploit this belief hole to learn and write arbitrary information

The assault methodology entails figuring out SYSTEM-owned named pipes with overly permissive Entry Management Lists (ACLs) permitting “Everybody” learn/write entry, then reverse-engineering the pipe protocol via static evaluation.

Researchers have found cases the place companies course of requests with out adequate authorization checks.

Permitting commonplace customers to set off administrative capabilities similar to HKLM registry modifications on the service’s behalf.

A notable case entails a industrial antivirus answer the place a poorly secured named pipe enabled unauthorized registry manipulation.

Named Pipe Goal Assortment

Permitting attackers to configure Picture File Execution Choices (IFEO) to execute arbitrary code within the SYSTEM context.

Safety groups ought to audit third-party kernel drivers for extreme IOCTL permissions and validate all person enter earlier than kernel processing.

Named pipe implementations should implement specific permission checks on delicate operations and implement strict protocol validation.

Hackyboiz analysis revealed revealed that organizations ought to stock uncovered named pipes and disable these with overly permissive ACLs.

Privilege escalation assaults

As Home windows environments proceed to draw refined attackers, understanding these privilege-escalation vectors has turn out to be important for defending enterprise programs towards native elevation-of-privilege assaults.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Drivers, Escalation, Kernel, LPE, Named, Pipes, Privilege, Vulnerabilities, Windows

Post navigation

Previous Post: Fresh MongoDB Vulnerability Exploited in Attacks
Next Post: Infostealer Malware Delivered in EmEditor Supply Chain Attack

Related Posts

Internet Archive Abused for Hosting Stealthy JScript Loader Malware Internet Archive Abused for Hosting Stealthy JScript Loader Malware Cyber Security News
SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach Cyber Security News
Critical Security Update Addresses Veeam RCE Vulnerabilities Critical Security Update Addresses Veeam RCE Vulnerabilities Cyber Security News
XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours Cyber Security News
Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers Cyber Security News
Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark