The Windows kernel links your PC’s hardware to the operating system. Its default security makes it extremely hard for malware to penetrate. Yet, a new type of KASLR bypass threats are exploiting LOLDrivers and cache timings to sidestep top-level access permissions. While they target older systems, these attacks have recently been shown to impact Windows 11 24H2 as well, exposing kernel memory. Here’s how to close these last-mile security gaps.
The Windows kernel controls access to system resources like memory, CPU, and connected devices. To protect it, Windows uses Kernel Address Space Layout Randomization (KASLR), which randomizes memory locations. Bypassing it is very difficult which makes it harder for kernel-level malware to slip in.
However, in June 2025, an HVCI-compatible driver, eneio64.sys, was used to bypass KASLR on Windows 11 24H2. enios64.sys falls in the category of Living off the Land (LOLDrivers) which can be compromised with what is called a “Low Stub” method.
In this, malware authors use guesswork and memory scanning to uncover the base memory address of your PC. Bypassing the kernel is a gateway to real-world attacks, and the detection challenges indicate a high level of threat severity.
Protect Your PC from KASLR Bypass Threats on Kernel Memory - Make Tech Easier
Protect your Windows PC from kernel-level malware by addressing KASLR bypass threats that override the default Windows protections.