CVE-2025-24983

HIGH
2025-03-11 [email protected]
7.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 19:52 vuln.today
Added to CISA KEV
Oct 27, 2025 - 17:14 cisa
CISA KEV
Patch Released
Oct 27, 2025 - 17:14 nvd
Patch available
CVE Published
Mar 11, 2025 - 17:16 nvd
HIGH 7.0

Description

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.

Analysis

A use-after-free vulnerability in the Windows Win32 Kernel Subsystem enables local privilege escalation from authorized user to SYSTEM level. This KEV-listed vulnerability (CVE-2025-24983) requires the attacker to win a race condition but has been actively exploited in targeted attacks. Microsoft has released patches for all supported Windows versions.

Technical Context

The vulnerability exists in the Win32k kernel-mode driver's handling of window objects. A race condition allows an attacker to trigger use of a freed kernel object, corrupting kernel memory in a controlled manner. While the CVSS score of 7.0 reflects the complexity of the race condition, successful exploitation grants full SYSTEM privileges. This class of Win32k vulnerabilities has been repeatedly exploited by advanced threat actors.

Affected Products

['Microsoft Windows 10', 'Microsoft Windows 11', 'Microsoft Windows Server 2016/2019/2022']

Remediation

Apply Microsoft security update immediately. This is a KEV-listed vulnerability — federal agencies must remediate per BOD 22-01 deadlines. Monitor for suspicious process behavior indicating privilege escalation attempts.

Priority Score

86
Low Medium High Critical
KEV: +50
EPSS: +0.7
CVSS: +35
POC: 0

Share

CVE-2025-24983 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy