Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 24 Jan 2026 01:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vb-audio Software
Vb-audio Software matrix Vb-audio Software matrix Coconut Vb-audio Software voicemeeter Vb-audio Software voicemeeter Banana Vb-audio Software voicemeeter Potato |
|
| Vendors & Products |
Vb-audio Software
Vb-audio Software matrix Vb-audio Software matrix Coconut Vb-audio Software voicemeeter Vb-audio Software voicemeeter Banana Vb-audio Software voicemeeter Potato |
Fri, 23 Jan 2026 08:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References | ||
| Metrics |
ssvc
|
Fri, 23 Jan 2026 01:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys). The drivers map non-paged pool memory into user space via MmMapLockedPagesSpecifyCache using UserMode access without proper exception handling. If the mapping fails, such as when a process has exhausted available virtual address space, MmMapLockedPagesSpecifyCache raises an exception that is not caught, causing a kernel crash (BSoD), typically SYSTEM_SERVICE_EXCEPTION with STATUS_NO_MEMORY. This flaw allows a local unprivileged user to trigger a denial-of-service on affected Windows systems. | |
| Title | VB-Audio Voicemeeter & Matrix Drivers DoS via MmMapLockedPagesSpecifyCache | |
| Weaknesses | CWE-755 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-22T18:24:52.849Z
Reserved: 2026-01-15T18:42:20.939Z
Link: CVE-2026-23762
Updated: 2026-01-22T18:24:48.989Z
Status : Received
Published: 2026-01-22T17:16:37.480
Modified: 2026-01-22T17:16:37.480
Link: CVE-2026-23762
No data.
OpenCVE Enrichment
Updated: 2026-01-24T01:32:16Z