Impact
VB‑Audio’s virtual audio drivers expose a length value that can be altered by a non‑privileged local user. When the modified value is later used as the argument to IoAllocateMdl without proper validation, the kernel attempts to map the user‑controlled size as a non‑paged pool MDL. This results in a system crash, typically PAGE_FAULT_IN_NONPAGED_AREA, and denies availability for the affected Windows machine.
Affected Systems
The vulnerability affects VB‑Audio Software’s Voicemeeter Standard versions ending in 1.1.1.9 or earlier, Voicemeeter Banana versions ending in 2.1.1.9 or earlier, Voicemeeter Potato versions ending in 3.1.1.9 or earlier, Matrix versions ending in 1.0.2.2 or earlier, and Matrix Coconut versions ending in 2.0.2.2 or earlier. All products run on Microsoft Windows as audio drivers.
Risk and Exploitability
The CVSS base score of 6.8 indicates medium severity, and the EPSS score of less than 1% shows a very low likelihood of real‑world exploitation at the time of analysis. The flaw is not listed in the CISA KEV catalog. A local unprivileged user can trigger the crash by interacting with the vulnerable driver; no network or elevated privileges are required. Consequently, the risk is confined to local systems where the affected drivers are installed, but a single exploit causes an irreversible denial of service until the system is rebooted or patched.
OpenCVE Enrichment