Cyber Posture

CVE-2025-24983

HighCISA KEVActive Exploitation

Published: 11 March 2025

Published
11 March 2025
Modified
27 October 2025
KEV Added
11 March 2025
Patch
CVSS Score 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0147 81.0th percentile
Risk Priority 35 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-24983 is a use-after-free vulnerability (CWE-416) in the Windows Win32 Kernel Subsystem. Published on 2025-03-11, it carries a CVSS v3.1 base score of 7.0 (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) and affects Windows operating systems where the Win32 Kernel Subsystem is present.

The vulnerability can be exploited by an authorized local attacker with low privileges. Exploitation requires high attack complexity and local access but no user interaction. Successful exploitation enables privilege escalation, granting high impacts on confidentiality, integrity, and availability.

Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983 provides details on patches and remediation. The vulnerability is referenced in CISA's Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24983.

Details

CWE(s)
CWE-416
KEV Date Added
11 March 2025

Affected Products

microsoft
windows 10 1507
≤ 10.0.10240.20947 · ≤ 10.0.10240.20947
microsoft
windows 10 1607
≤ 10.0.14393.7876 · ≤ 10.0.14393.7876
microsoft
windows server 2008
all versions, r2
microsoft
windows server 2012
all versions, r2
microsoft
windows server 2016
≤ 10.0.14393.7876

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Use-after-free in Windows Win32 Kernel Subsystem directly enables local privilege escalation from low-privileged context to high impacts on C/I/A.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References