Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access

Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access

Posted on June 14, 2025June 14, 2025 By CWS

A safety researcher has revealed an in depth evaluation demonstrating how Kernel Handle Area Structure Randomization (KASLR) protections could be circumvented on Home windows 11 24H2 techniques via exploitation of an HVCI-compatible driver with bodily reminiscence entry capabilities.

The analysis, revealed by safety researcher Yazid on June 9, 2025, presents a novel strategy to acquiring the Home windows kernel base handle by leveraging the eneio64.sys driver, which gives learn and write primitives on the system’s bodily reminiscence.

The demonstration represents a continuation of earlier analysis into exploiting HVCI-compatible kernel drivers, particularly specializing in how attackers or safety researchers can simulate the interpretation of bodily addresses into digital addresses utilizing paging constructions.

This system turns into significantly related given Microsoft’s current safety enhancements in Home windows 11 24H2, which now require SeDebugPrivilege for operations that beforehand labored from medium integrity processes, equivalent to utilizing EnumDeviceDrivers or NtQuerySystemInformation to leak kernel module addresses.

Xacone researchers famous that conventional KASLR bypass strategies have turn into more and more difficult on fashionable Home windows techniques, with instruments like prefetch-tool exhibiting inconsistent outcomes throughout completely different environments.

The researcher particularly mentions that whereas such instruments labored on host machines, they did not perform reliably on Home windows 11 24H2 digital machine environments used for testing.

The approach exploits the Low Stub, a knowledge construction constantly current initially of bodily reminiscence layouts on HVCI-enabled techniques, situated between bodily addresses 0x10000 and 0x20000.

This construction comprises numerous kernel addresses, together with these of non-exported features, although many are particular to the {Hardware} Abstraction Layer (HAL).

Technical Implementation and Reminiscence Scanning Methodology

The core innovation of this analysis lies in its strategy to figuring out the kernel’s entry level inside the Low Stub construction.

Quite than counting on hardcoded offsets or conventional enumeration strategies, the approach searches for the KiSystemStartup perform handle, which serves because the kernel’s entry level.

The researcher demonstrates the best way to parse the PE picture of ntoskrnl.exe to retrieve the Relative Digital Handle (RVA) of the entry level, then scan the Low Stub for addresses matching the final three bytes of this RVA.

Home windows 11 24H2 (Supply – GitHub)

The implementation entails a scientific reminiscence scan utilizing the next strategy: for (physical_offset = 0x10000; physical_offset < 0x20000; physical_offset += 8) to iterate via potential Low Stub areas, studying 64-bit values and evaluating them towards the recognized entry level sample.

When a match is discovered utilizing the situation if ((qword_value & 0xFFFFF) == (ntosEntryPoint & 0xFFFFF)), the kernel base handle could be calculated by subtracting the entry level’s RVA from the found handle.

The Home windows kernel’s alignment to 2MB boundaries, leveraging large-page reminiscence mappings, ensures constant handle patterns that facilitate this detection technique throughout completely different system configurations.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:24H2, Access, Broken, Driver, HVCICompatible, KASLR, Memory, Physical, Windows

Post navigation

Previous Post: AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
Next Post: Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services

Related Posts

Telegram-Based ResokerRAT Threatens Windows Security Telegram-Based ResokerRAT Threatens Windows Security Cyber Security News
Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware Cyber Security News
Critical Cisco SD-WAN Vulnerability PoC Exploit Released Critical Cisco SD-WAN Vulnerability PoC Exploit Released Cyber Security News
Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser Cyber Security News
New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals Cyber Security News
Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Amazon Quick’s Vulnerability Exposed AI Chat to Unauthorized Users
  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Amazon Quick’s Vulnerability Exposed AI Chat to Unauthorized Users
  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark