Privilege Escalation Vulnerability in ThrottleStop Driver by TechPowerUp
CVE-2025-7771

8.7HIGH

Key Information:

Vendor
CVE Published:
6 August 2025

Badges

📈 Score: 1,020👾 Exploit Exists🟡 Public PoC

What is CVE-2025-7771?

CVE-2025-7771 is a privilege escalation vulnerability found in the ThrottleStop driver developed by TechPowerUp. This driver is designed to help users manage CPU throttling and power settings on Windows systems. The vulnerability arises from two exposed IOCTL (Input Output Control) interfaces that permit unauthorized read and write access to physical memory through the MmMapIoSpace function. This flawed implementation enables potentially malicious user-mode applications to manipulate the running Windows kernel, allowing them to execute arbitrary code with kernel-level privileges. The ability to patch the kernel and invoke kernel functions can lead to severe repercussions, such as bypassing security controls and executing further malicious actions within the system environment.

Potential Impact of CVE-2025-7771

  1. Privilege Escalation: The vulnerability allows local attackers to escalate their privileges to kernel level, enabling them to execute arbitrary code that can entirely compromise the system’s integrity.

  2. Bypassing Security Mechanisms: Attackers can disable security software or circumvent kernel-level protections, significantly diminishing the effectiveness of existing security measures and leaving the system vulnerable to subsequent attacks.

  3. Increased Risk of Compromise: With access to kernel functions, attackers can initiate follow-on attacks that may facilitate full system control, data breaches, and other malicious activities, thereby posing a substantial threat to organizational security.

Affected Version(s)

ThrottleStop 3.0.0.0 and possibly others

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.