Cyber Posture

CVE-2025-24056

High

Published: 11 March 2025

Published
11 March 2025
Modified
02 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0035 57.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse PowerShell commands and scripts for execution.

Security Summary

CVE-2025-24056 is a heap-based buffer overflow vulnerability (CWE-122) in the Windows Telephony Server component of Microsoft Windows. Published on March 11, 2025, it has a CVSS v3.1 base score of 8.8, reflecting its high severity due to network accessibility, low attack complexity, and potential for significant impact.

An unauthorized attacker can exploit this vulnerability over a network without requiring privileges (AV:N/AC:L/PR:N), though it necessitates user interaction (UI:R), such as clicking a malicious link or opening a crafted file. Successful exploitation allows arbitrary code execution with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), potentially leading to full system compromise in the context of the affected server process.

Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24056 provides details on patches and recommended mitigations for addressing this vulnerability.

Details

CWE(s)
CWE-122

Affected Products

microsoft
windows 10 1507
≤ 10.0.10240.20947
microsoft
windows 10 1607
≤ 10.0.14393.7876 · ≤ 10.0.14393.7876
microsoft
windows 10 1809
≤ 10.0.17763.7009 · ≤ 10.0.17763.7009
microsoft
windows 10 21h2
≤ 10.0.19044.5608
microsoft
windows 10 22h2
≤ 10.0.19045.5608
microsoft
windows 11 22h2
≤ 10.0.22621.5039
microsoft
windows 11 23h2
≤ 10.0.22631.5039
microsoft
windows 11 24h2
≤ 10.0.26100.3403 · 10.0.26100.3403 — 10.0.26100.3476
microsoft
windows server 2008
all versions, r2
microsoft
windows server 2012
r2 · ≤ 6.2.9200.25368
+5 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1059.001 PowerShell Execution
Adversaries may abuse PowerShell commands and scripts for execution.
Why these techniques?

Heap buffer overflow in Windows Telephony Server enables RCE via malicious link or crafted file (user interaction), directly mapping to client exploitation and arbitrary command/script execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References