Home

Description

VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a local privilege escalation vulnerability in the VBMatrix VAIO virtual audio driver (vbmatrixvaio64*_win10.sys). The driver allocates a 128-byte non-paged pool buffer and, upon receiving IOCTL 0x222060, maps it into user space using an MDL and MmMapLockedPagesSpecifyCache. Because the allocation size is not page-aligned, the mapping exposes the entire 0x1000-byte kernel page containing the buffer plus adjacent non-paged pool allocations with read/write permissions. An unprivileged local attacker can open a device handle (using the required 0x800 attribute flag), invoke the IOCTL to obtain the mapping, and then read or modify live kernel objects and pointers present on that page. This enables bypass of KASLR, arbitrary kernel memory read/write within the exposed page, corruption of kernel objects, and escalation to SYSTEM.

PUBLISHED Reserved 2026-01-15 | Published 2026-01-22 | Updated 2026-01-22 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-668 Exposure of Resource to Wrong Sphere

Product status

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Credits

Klaus Hahnenkamp finder

References

github.com/emkaix/security-research/tree/main/CVE-2026-23763 technical-description exploit

forum.vb-audio.com/viewtopic.php?p=7574 release-notes patch

forum.vb-audio.com/viewtopic.php?p=7527 release-notes patch

vb-audio.com/ product

www.vulncheck.com/...e-escalation-via-kernel-memory-exposure third-party-advisory

cve.org (CVE-2026-23763)

nvd.nist.gov (CVE-2026-23763)

Download JSON