EUVD-2025-17777

| CVE-2025-33067 HIGH
2025-06-10 [email protected]
8.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17777
CVE Published
Jun 10, 2025 - 17:22 nvd
HIGH 8.4

Description

Improper privilege management in Windows Kernel allows an unauthorized attacker to elevate privileges locally.

Analysis

Local privilege escalation vulnerability in the Windows Kernel stemming from improper privilege management (CWE-269), allowing an unauthenticated attacker with local system access to escalate privileges without user interaction. This affects multiple Windows versions and has a CVSS 8.4 severity rating indicating high confidentiality, integrity, and availability impact. The vulnerability's low attack complexity (AC:L) and lack of privilege requirements (PR:N) indicate it is relatively straightforward to exploit for any local attacker.

Technical Context

The vulnerability resides in the Windows Kernel's privilege management subsystem, which is responsible for enforcing access control and privilege boundaries between user-mode and kernel-mode execution contexts. CWE-269 (Improper Access Control - Generic) indicates the root cause is inadequate validation or enforcement of privilege transitions within the kernel. The flaw likely allows an attacker to bypass privilege escalation protections through improper handling of access control mechanisms, potentially involving token impersonation, capability checks, or privilege inheritance flaws. Affected systems include Windows operating systems across multiple versions where the vulnerable kernel component processes system calls related to privilege management without sufficient validation of requester credentials or privilege levels.

Affected Products

Windows Kernel subsystems across multiple Windows OS versions are affected, including but not limited to: Windows 10 (all supported versions), Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022. Specific CPE data is not provided in the vulnerability description; however, typical affected CPEs would follow the pattern: cpe:2.3:o:microsoft:windows_*:*:*:*:*:*:*:*:* where * represents version numbers. The vulnerability affects all editions (Home, Pro, Enterprise) and server variants where the Windows Kernel handles local privilege management. Organizations should cross-reference Microsoft Security Bulletins or advisories associated with CVE-2025-33067 for precise version mappings and availability of patches.

Remediation

1. PATCH: Apply the latest Windows security update from Microsoft addressing CVE-2025-33067 (specific patch KB numbers not provided in available data—consult Microsoft Security Update Guide or MSRC advisory). 2. IMMEDIATE ACTIONS: Prioritize patching for systems with local user access, particularly servers and shared workstations. 3. MITIGATIONS (if patch unavailable): Restrict local logon privileges where possible; enforce strong authentication and multi-factor authentication to limit lateral movement post-compromise; deploy application whitelisting to restrict execution of privilege escalation tools; monitor for suspicious privilege elevation attempts in Windows Event Logs (Security event IDs 4624, 4672, 4673). 4. DETECTION: Monitor for abnormal token creation, unexpected kernel-mode access from user-mode processes, and unusual privilege escalation patterns. 5. VERIFICATION: After patching, verify kernel version updates via 'winver' or 'systeminfo' commands.

Priority Score

42
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +42
POC: 0

Share

EUVD-2025-17777 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy