Cyber Posture

CVE-2025-24043

High

Published: 11 March 2025

Published
11 March 2025
Modified
03 July 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 33.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-24043 is an improper verification of cryptographic signature vulnerability (CWE-347) affecting the .NET framework. Published on 2025-03-11, it enables an authorized attacker to execute code over a network due to flawed signature validation mechanisms within .NET components.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating exploitation requires network access, high attack complexity, and low privileges. A low-privileged authorized attacker can leverage this flaw without user interaction to achieve high-impact confidentiality, integrity, and availability effects, culminating in remote code execution.

For mitigation details, refer to the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24043.

Details

CWE(s)
CWE-347

Affected Products

microsoft
windbg
≤ 1.2502.25002.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables remote code execution over a network via flawed cryptographic signature verification in .NET components, directly mapping to exploitation of public-facing applications for initial access or code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References