CVE-2025-24993
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
Analysis
A heap-based buffer overflow in the Windows NTFS driver allows unauthenticated local code execution, providing kernel-level access when a user mounts a crafted NTFS filesystem image. This KEV-listed vulnerability (CVE-2025-24993) targets the most widely used Windows filesystem, making it a significant threat through malicious USB drives, VHD files, or network shares.
Technical Context
The NTFS.sys kernel driver improperly handles certain NTFS metadata structures, leading to a heap buffer overflow in the kernel pool. NTFS is the default and most trusted filesystem on Windows, so the attack surface is broad — any operation that causes Windows to parse NTFS metadata (mounting drives, opening VHDs, browsing network shares) can trigger the vulnerability.
Affected Products
['Microsoft Windows 10 (all versions)', 'Microsoft Windows 11', 'Microsoft Windows Server 2016/2019/2022']
Remediation
Apply Microsoft security update immediately. This is KEV-listed — remediate per CISA deadlines. Restrict VHD mounting via Group Policy. Block VHD/VHDX attachments at email gateways. Limit removable media usage on sensitive systems.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today