EUVD-2025-17738

| CVE-2025-33070 HIGH
2025-06-10 [email protected]
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17738
CVE Published
Jun 10, 2025 - 17:22 nvd
HIGH 8.1

Description

Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network.

Analysis

Use-of-uninitialized-resource vulnerability in Windows Netlogon that allows unauthenticated network attackers to achieve privilege escalation through a complex exploitation path. The vulnerability affects Windows systems running Netlogon services and enables remote code execution with high impact on confidentiality, integrity, and availability. Given the network-based attack vector and lack of authentication requirements, this represents a significant threat to networked Windows environments, though exploitation requires specific conditions (high attack complexity).

Technical Context

Windows Netlogon is a critical authentication protocol and service (netlogon.dll) responsible for secure communication between Windows systems and domain controllers. CWE-908 (Use of Uninitialized Resource) indicates that the vulnerability stems from uninitialized memory being referenced during Netlogon operations, potentially allowing an attacker to read or manipulate memory contents over the network. This class of vulnerability is particularly dangerous in authentication protocols because uninitialized buffers may contain sensitive data (session keys, credentials) or allow exploitation of predictable memory states. The flaw exists at the network-facing Netlogon RPC interface, making it remotely exploitable without prior system access. Affected CPE would typically include: cpe:2.3:o:microsoft:windows:* with Netlogon service enabled, and potentially cpe:2.3:a:microsoft:netlogon:* across multiple Windows versions (Server 2016-2022, Windows 10-11).

Affected Products

Affected products include: (1) Microsoft Windows Server 2016, 2019, 2022 with Netlogon service enabled (standard configuration); (2) Microsoft Windows 10 (all versions) with network authentication enabled; (3) Microsoft Windows 11 (all versions); (4) Any system with netlogon.dll version prior to patch release. Specific CVE references would normally include Microsoft Security Advisory and KB article numbers (e.g., KB5xxxxx). The vulnerability affects systems in standard domain-joined configurations where Netlogon handles authentication traffic. Non-domain-joined systems or those with Netlogon service disabled are not vulnerable. Network segmentation isolating domain controllers may reduce exposure for some endpoints.

Remediation

Immediate actions: (1) Apply Microsoft security updates for Windows Netlogon immediately upon release—patch all affected Windows Server and client systems; (2) Monitor Microsoft Security Update Guide (portal.msrc.microsoft.com) for CVE-2025-33070 patch availability and KB article; (3) Temporary mitigations while awaiting patches: restrict network access to Netlogon RPC endpoints (TCP/UDP 135, 139, 445) using firewall rules, limit to trusted domain controller IPs; (4) Disable unnecessary Netlogon service where not required (non-domain-joined systems); (5) Implement network segmentation to restrict lateral movement from compromised systems; (6) Deploy endpoint detection and response (EDR) to monitor for anomalous Netlogon RPC traffic and privilege escalation attempts. Prioritize domain controller patching first, then domain-joined servers, then clients. Expected patch availability: coordinate with Microsoft monthly patch cycles or emergency out-of-band releases if active exploitation emerges.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +40
POC: 0

Share

EUVD-2025-17738 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy