This vulnerability occurs when a Windows driver defines an IOCTL using METHOD_NEITHER but fails to properly check the user-supplied memory addresses before using them.
When a driver uses METHOD_NEITHER for an IOCTL, it receives raw pointers directly from user mode. The driver code itself becomes fully responsible for validating that these addresses are safe and accessible before any read or write operation. Skipping this validation is dangerous because the driver will blindly trust user-controlled pointers. Attackers can exploit this by passing crafted or invalid memory addresses, which can lead to reading sensitive kernel data, corrupting system memory, or crashing the system. Proper validation includes checks for user-mode address ranges, probe operations, and using structured methods like ProbeForRead or ProbeForWrite to prevent privilege escalation and denial-of-service attacks.
Impact: Modify MemoryRead MemoryExecute Unauthorized Code or CommandsDoS: Crash, Exit, or Restart
An attacker may be able to access memory that belongs to another process or user. If the attacker can control the contents that the IOCTL writes, it may lead to code execution at high privilege levels. At the least, a crash can occur.