Vulnerable Windows kernel mode drivers can be exploited from user mode without requiring the specific hardware they were designed for, according to a recent technical analysis1. This finding has significant implications for driver-oriented vulnerability research, as it allows researchers to evaluate the exploitability of individual vulnerabilities that would otherwise be inaccessible due to hardware dependencies. By bypassing the need for specific hardware, researchers can now assess the potential impact of vulnerabilities in kernel mode drivers, which could lead to a better understanding of the overall security posture of Windows systems. The analysis highlights the importance of considering the potential for user-mode exploitation of kernel mode drivers, even in the absence of specific hardware. This matters to security practitioners because it underscores the need to prioritize the security of kernel mode drivers, regardless of the hardware they are intended to support.