Cyber Posture

CVE-2025-24076

High

Published: 11 March 2025

Published
11 March 2025
Modified
07 July 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0295 86.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-24076 is an improper access control vulnerability in the Windows Cross Device Service that allows an authorized attacker to elevate privileges locally. Published on 2025-03-11, it carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) and maps to CWE-284: Improper Access Control.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) but requires user interaction (UI:R), such as tricking the user into performing a specific action. Successful exploitation enables privilege escalation without changing scope (S:U), resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H).

The Microsoft Security Response Center provides an update guide for this vulnerability at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24076, which details patches and mitigation recommendations.

Details

CWE(s)
CWE-284

Affected Products

microsoft
windows 11 22h2
≤ 10.0.22621.5039
microsoft
windows 11 23h2
≤ 10.0.22631.5039
microsoft
windows 11 24h2
≤ 10.0.26100.3403
microsoft
windows server 2022 23h2
≤ 10.0.25398.1486
microsoft
windows server 2025
≤ 10.0.26100.3403

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE describes a local privilege escalation vulnerability via improper access control in a Windows service, directly mapping to exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References