Home

Description

Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD with a parallel thread changing the memory’s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the userspace to change page permissions half way through the routine.  A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations.

PUBLISHED Reserved 2024-11-07 | Published 2024-12-16 | Updated 2025-09-05 | Assigner rapid7




HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H

Problem types

CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

Product status

Default status
unaffected

<= 4.1 (semver)
affected

Credits

We thank David Baptiste from the ERNW Vulnerability Disclosure Team for responsibly disclosing this issue. reporter

References

github.com/Velocidex/WinPmem/releases/tag/v4.1.dev1

cve.org (CVE-2024-10972)

nvd.nist.gov (CVE-2024-10972)

Download JSON