Description
The pstrip64.sys driver in EnTech Taiwan PowerStrip <=3.90.736 allows local users to escalate privileges to SYSTEM via a crafted IOCTL request enabling unprivileged users to map arbitrary physical memory into their address space and modify critical kernel structures.
Published: 2026-04-09
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the pstrip64.sys driver of the EnTech Taiwan PowerStrip, which permits local users to issue a specially crafted IOCTL request that maps arbitrary physical memory into the process address space. This mapping enables a low‑privileged user to read or write any memory, including critical kernel data structures. Because the driver runs with SYSTEM privileges, a successful exploitation results in privilege escalation to SYSTEM, giving the attacker full control over the system. The flaw is rooted in improper privilege management (CWE-269).

Affected Systems

This flaw affects installers of EnTech Taiwan PowerStrip for all platforms where the pstrip64.sys driver is installed. Vulnerable versions are any release up to and including 3.90.736. The issue is limited to the specified driver; other EnTech products are not mentioned.

Risk and Exploitability

The CVSS base score of 7.8 indicates a high severity level, while the EPSS score of less than 1% suggests a low probability of widespread exploitation in the near term. The flaw is not listed in the CISA KEV catalog, implying no known widespread active exploitation. To exploit the vulnerability, an attacker must be present on the system with user‑level access and must be able to invoke the driver’s IOCTL interface. Once the arbitrary physical memory mapping is achieved, the attacker can manipulate kernel data structures, effectively achieving SYSTEM privileges.

Generated by OpenCVE AI on April 15, 2026 at 19:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest PowerStrip driver update from EnTech Taiwan that removes the unrestricted physical memory mapping vulnerability.
  • If no update is available at the time, limit local user access to the pstrip64.sys driver by adjusting the driver’s security descriptor or disabling the driver until a patch is released.
  • Continuously monitor system logs for anomalous IOCTL activity against the PowerStrip driver and investigate any unexpected access.

Generated by OpenCVE AI on April 15, 2026 at 19:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Unrestricted Physical Memory Mapping in EnTech Taiwan PowerStrip Driver

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Unrestricted Physical Memory Mapping in EnTech Taiwan PowerStrip Driver
Weaknesses CWE-284
CWE-788

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Unrestricted Physical Memory Mapping in EnTech Taiwan PowerStrip Driver
Weaknesses CWE-284
CWE-788

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Entechtaiwan
Entechtaiwan powerstrip
Vendors & Products Entechtaiwan
Entechtaiwan powerstrip

Thu, 09 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description The pstrip64.sys driver in EnTech Taiwan PowerStrip <=3.90.736 allows local users to escalate privileges to SYSTEM via a crafted IOCTL request enabling unprivileged users to map arbitrary physical memory into their address space and modify critical kernel structures.
References

Subscriptions

Entechtaiwan Powerstrip
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-14T16:35:10.310Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29923

cve-icon Vulnrichment

Updated: 2026-04-14T15:05:13.709Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-09T20:16:24.693

Modified: 2026-04-14T17:16:48.907

Link: CVE-2026-29923

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:45:12Z

Weaknesses