Cyber Posture

CVE-2025-24039

High

Published: 11 February 2025

Published
11 February 2025
Modified
02 July 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses.

Security Summary

CVE-2025-24039 is an Elevation of Privilege vulnerability affecting Visual Studio Code. Classified under CWE-427 (Untrusted Search Path), it carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H), indicating a high-severity issue published on 2025-02-11.

A local attacker with low privileges (PR:L) can exploit this vulnerability under low complexity conditions (AC:L) that require user interaction (UI:R). Successful exploitation enables high-impact effects on confidentiality, integrity, and availability (C:H/I:H/A:H) with unchanged scope (S:U), typically allowing the attacker to elevate privileges on the affected system.

Mitigation guidance is available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24039.

Details

CWE(s)
CWE-427

Affected Products

microsoft
visual studio code
≤ 1.97.1

MITRE ATT&CK Enterprise Techniques

T1574.001 DLL Stealth
Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses.
Why these techniques?

CWE-427 Untrusted Search Path vulnerability directly enables DLL Search Order Hijacking (T1038) to achieve local privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References