Skip to content

Instantly share code, notes, and snippets.

@christopher-ellis-workday
Last active September 10, 2025 15:41
Show Gist options
  • Select an option

  • Save christopher-ellis-workday/756c998f9f59dd2c437d83e60c7ed220 to your computer and use it in GitHub Desktop.

Select an option

Save christopher-ellis-workday/756c998f9f59dd2c437d83e60c7ed220 to your computer and use it in GitHub Desktop.
CVE-2025-50892: Insufficient Privilege Validation in eudskacs.sys driver version 20250328 allows data disclosure, DoS, and privilege escalation

CVE ID: CVE-2025-50892
Vendor: EaseUS Todo
Product/Component: The eudskacs.sys driver version 20250328 shipped with EaseUS Todo Backup 1.2.0.1
Public Disclosure Date: [2025-09-04]

Summary

The eudskacs.sys driver version 20250328 shipped with EaseUS Todo Backup 1.2.0.1 fails to properly validate privileges for I/O requests (IRP_MJ_READ/IRP_MJ_WRITE) sent to its device object. This allows a local, low-privileged attacker to perform arbitrary raw disk reads and writes, leading to sensitive information disclosure, denial of service, or local privilege escalation.

Impact

This can lead to a low-privileged user reading arbitrary system files including SAM/SYSTEM hive, denial of service, or potentially privilege escalation.

Attack Vector & Conditions

This is a local exploit, and requires that the vulnerable driver be installed on the system for exploitation.

Reference

https://gist.github.com/christopher-ellis-workday/756c998f9f59dd2c437d83e60c7ed220
https://medium.com/workday-engineering/leveraging-raw-disk-reads-to-bypass-edr-f145838b0e6d

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment