Cyber Posture

CVE-2025-24994

High

Published: 11 March 2025

Published
11 March 2025
Modified
03 July 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-24994 is an improper access control vulnerability (CWE-284) in the Windows Cross Device Service, published on 2025-03-11. It carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) and affects Windows operating systems where the service is present.

A local attacker with low privileges (PR:L) can exploit this vulnerability through low-complexity techniques (AC:L) that require user interaction (UI:R). Successful exploitation enables privilege escalation, granting high-impact access to confidentiality, integrity, and availability (C:H/I:H/A:H) without changing scope.

The Microsoft Security Response Center provides an update guide with details on patches and mitigation at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24994.

Details

CWE(s)
CWE-284

Affected Products

microsoft
windows 11 22h2
≤ 10.0.22621.5039 · ≤ 10.0.22621.5039
microsoft
windows 11 23h2
≤ 10.0.22631.5039 · ≤ 10.0.22631.5039
microsoft
windows 11 24h2
≤ 10.0.26100.3403 · ≤ 10.0.26100.3403

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Improper access control vulnerability in Windows service directly enables local privilege escalation by low-privileged attackers.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References