Skip to content
This repository was archived by the owner on Sep 22, 2025. It is now read-only.

swzhouu/Windows_PowerSvc_BSOD

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Windows Power Service BSOD

This repository contains two Proof of Concepts for vulnerabilities in the Windows Power Service that lead to a BSOD. The Power Service in Windows loads the \System32\umpo.dll module. This contains the RPC interface 6c9b7b96-45a8-4cca-9eb3-e21ccf8b5a89, which contains two vulnerable procedures. Both calls take among others an GUID as parameter. When specifying a NULL value for the GUID when invoking the RPC call, the Power service crashes and causes an BSOD.

One of the RPC calls, UmpoRpcReadProfileAlias, only works on Windows-11 based systems, so Windows 11, Windows server 2025, etc. The other call, UmpoRpcReadFromUserPowerKey, was tested successfully against Windows-10 systems as well. Any user can invoke the RPC calls.

The impact is that an low privileged user is able to DoS a Windows client or server by crashing the Power service that results in an BSOD. The Power service cannot be turned off because it is a core system service responsible for managing power settings, battery status, and power policies. Windows does not allow stopping or disabling it through Services (services.msc) or via command-line tools like sc config or net stop.

UmpoRpcReadProfileAlias

PoC.mp4

UmpoRpcReadFromUserPowerKey

PoC.mp4

For more details about these vulnerabilities, check out the blog post: https://incendium.rocks/posts/Unplugging-Power-Service/

About

Proof of concepts for two vulnerabilities in the Windows Power Service that lead to a BSOD

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • C# 100.0%