CVE-2025-24985

HIGH
2025-03-11 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 12, 2026 - 19:52 vuln.today
Added to CISA KEV
Oct 27, 2025 - 17:14 cisa
CISA KEV
PoC Detected
Oct 27, 2025 - 17:14 vuln.today
Public exploit code
Patch Released
Oct 27, 2025 - 17:14 nvd
Patch available
CVE Published
Mar 11, 2025 - 17:16 nvd
HIGH 7.8

Description

Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.

Analysis

An integer overflow in the Windows Fast FAT Driver allows unauthenticated local code execution through crafted FAT filesystem images. KEV-listed with public PoC, this vulnerability (CVE-2025-24985) can be triggered by mounting a malicious USB drive or VHD file, making it a potent vector for physical access attacks and social engineering scenarios.

Technical Context

The Windows Fast FAT filesystem driver (fastfat.sys) fails to properly validate integer arithmetic when processing FAT directory entries. An attacker-controlled integer value overflows during size calculation, resulting in an undersized kernel pool allocation. Subsequent data copy overwrites adjacent kernel memory. Because filesystem drivers operate in kernel mode, successful exploitation yields SYSTEM-level code execution.

Affected Products

['Microsoft Windows 10 (all versions)', 'Microsoft Windows 11', 'Microsoft Windows Server 2016/2019/2022']

Remediation

Apply Microsoft security update immediately. Disable AutoPlay for removable media. Consider blocking VHD file attachments at email gateway. Group Policy: restrict mounting of removable media on sensitive systems.

Priority Score

110
Low Medium High Critical
KEV: +50
EPSS: +1.1
CVSS: +39
POC: +20

Share

CVE-2025-24985 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy