CVE-2025-32712

| EUVD-2025-17784 HIGH
2025-06-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17784
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
CVE Published
Jun 10, 2025 - 17:21 nvd
HIGH 7.8

Description

Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

Analysis

Use-after-free vulnerability in the Windows Win32K graphics subsystem (GRFX component) that allows a locally authenticated attacker to achieve arbitrary code execution and privilege escalation without user interaction. The vulnerability affects Windows systems with affected Win32K versions and carries a CVSS score of 7.8 (high severity). Given the local attack vector requirement and the need for prior authentication, real-world exploitation is constrained to insider threats or attackers who have already achieved initial access; however, the severity of the impact (complete system compromise) makes this a critical priority for patching.

Technical Context

Win32K (win32k.sys) is the core Windows kernel-mode graphics and windowing subsystem responsible for rendering, window management, and DirectX operations. The vulnerability exists in the GRFX (graphics) component of Win32K, which handles graphics device interface (GDI) operations and graphics buffer management. CWE-416 (Use After Free) indicates that the vulnerability stems from accessing memory that has been deallocated—specifically, the graphics subsystem likely frees a graphics object (such as a bitmap, device context, or font handle) but fails to properly invalidate all references to it, allowing an attacker to manipulate or read the freed memory. This is a classic kernel memory corruption vulnerability in a privileged subsystem, making exploitation particularly dangerous as it can lead to kernel code execution.

Affected Products

Windows systems with vulnerable Win32K kernel versions. Specific products likely include: Windows 10 (multiple versions), Windows 11, Windows Server 2019, Windows Server 2022, and potentially Windows Server 2025 depending on patch status. Exact CPE strings would be in the form 'cpe:2.3:o:microsoft:windows_*:*', with version ranges determined by Microsoft's patch release. Affected systems are those running unpatched versions of win32k.sys prior to Microsoft's security update for CVE-2025-32712. Consult Microsoft Security Update Guide and relevant KB articles for specific build numbers.

Remediation

1. Apply Microsoft's security patch immediately via Windows Update or WSUS for affected OS versions. 2. For systems that cannot be patched immediately, implement access controls to restrict local login capabilities to trusted users only. 3. Disable unnecessary graphics-intensive services if possible in headless/server environments. 4. Monitor for suspicious Win32K-related process behavior, kernel crashes, or unexpected privilege escalation attempts. 5. Escalate patch deployment for systems with high-risk user populations (developers, contractors, shared systems). 6. Verify patch application by checking win32k.sys file version and confirming KB article installation. Specific patch KB numbers and download links should be obtained from Microsoft Security Update Guide (portal.msrc.microsoft.com).

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +39
POC: 0

Share

CVE-2025-32712 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy