CVE-2025-24983
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
Analysis
A use-after-free vulnerability in the Windows Win32 Kernel Subsystem enables local privilege escalation from authorized user to SYSTEM level. This KEV-listed vulnerability (CVE-2025-24983) requires the attacker to win a race condition but has been actively exploited in targeted attacks. Microsoft has released patches for all supported Windows versions.
Technical Context
The vulnerability exists in the Win32k kernel-mode driver's handling of window objects. A race condition allows an attacker to trigger use of a freed kernel object, corrupting kernel memory in a controlled manner. While the CVSS score of 7.0 reflects the complexity of the race condition, successful exploitation grants full SYSTEM privileges. This class of Win32k vulnerabilities has been repeatedly exploited by advanced threat actors.
Affected Products
['Microsoft Windows 10', 'Microsoft Windows 11', 'Microsoft Windows Server 2016/2019/2022']
Remediation
Apply Microsoft security update immediately. This is a KEV-listed vulnerability — federal agencies must remediate per BOD 22-01 deadlines. Monitor for suspicious process behavior indicating privilege escalation attempts.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today