Impact
An improper boundary restriction in the Portwell Engineering Toolkits driver allows a local authenticated attacker to read and write arbitrary memory. The buffer overflow can be used to modify critical kernel structures, leading to privilege escalation or a denial‑of‑service event. The flaw is a classic memory buffer overflow (CWE‑119) that does not require remote access and can compromise the entire system.
Affected Systems
Portwell Engineering Toolkits version 4.8.2 is the only affected release. The vulnerability is tied to the Portwell Engineering Toolkits driver and is present in any installation running this specific version. No other version or vendor is listed as impacted.
Risk and Exploitability
The CVSS score of 9.3 indicates high severity. With an EPSS below 1% and no listing in the CISA KEV catalog, observed exploitation remains low. The vulnerability requires a locally authenticated attacker with access to the Portwell Engineering Toolkit driver; under those conditions the risk is significant but limited to local environments. Successful exploitation can lead to privilege escalation or denial of service, potentially compromising the entire system.
OpenCVE Enrichment