kernel exploitation

  1. MBT Transport Driver (netbt.sys) Local EoP: Patch, Mitigation & Detection

    Microsoft’s security update guide lists a high‑risk elevation‑of‑privilege entry for the Windows MBT Transport driver that, according to the vendor advisory, stems from an untrusted pointer dereference and can be used by an authorized local user to escalate to SYSTEM — a kernel‑level impact that...
  2. CVE-2025-53142: Kernel Use-After-Free in Microsoft BFS Enables Local Privilege Escalation

    Microsoft’s advisory listing for CVE-2025-53142 describes a use‑after‑free flaw in the Microsoft Brokering File System that can allow an authenticated, local attacker to escalate privileges on an affected Windows host — a classic kernel‑level memory corruption that deserves immediate attention...
  3. CVE-2025-53140: KTM Kernel UAF Privilege Escalation - Patch Now

    Microsoft’s Security Response Center has published an advisory for CVE‑2025‑53140, a use‑after‑free vulnerability in the Windows Kernel Transaction Manager (KTM) that Microsoft says can be exploited by an authorized local attacker to elevate privileges on an affected system. Background /...
  4. CVE-2025-50170: Local EoP in Windows Cloud Files Driver (cldflt.sys) Patch Now

    Microsoft has published an advisory for CVE-2025-50170, a local elevation-of-privilege (EoP) vulnerability in the Windows Cloud Files Mini Filter Driver (cldflt.sys) that—when reached by a local, authorized attacker—can be abused to obtain higher privileges on affected machines. The flaw stems...
  5. CVE-2025-50168: Windows Win32K ICOMP Type-Confusion Privilege Escalation

    Microsoft has assigned CVE-2025-50168 to a Windows kernel vulnerability in the Win32K ICOMP component described as "Access of resource using incompatible type ('type confusion')" that can allow an authorized local user to elevate privileges; Microsoft’s advisory is published in the Security...
  6. Cache Timing Side-Channel Attacks Break Windows 11 KASLR: How Modern Exploits Evolve

    Cache timing side-channel attacks have re-emerged as a topic of grave concern for system security in recent months, and a new demonstration targeting fully patched Windows 11 installations underscores just how sophisticated modern exploitation techniques have become. The recent revelation that...
  7. New CPU Cache Timing Attack Bypasses Windows 11 Kernel Address Space Randomization

    In the constant cat-and-mouse game between operating system security engineers and determined attackers, Kernel Address Space Layout Randomization (KASLR) remains one of the most crucial defenses in modern computing. Trusted by Windows 11 and earlier versions, KASLR aims to keep attackers...