CVE-2025-60724
Published: 11 November 2025
Description
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
Mitigating Controls (NIST 800-53 r5)AI
Requires organizations to identify, report, and correct flaws like this heap-based buffer overflow through timely application of vendor patches from Microsoft.
Implements memory protection mechanisms such as ASLR, DEP, and heap cookies that directly mitigate exploitation of heap buffer overflows for arbitrary code execution.
Mandates validation of inputs to the Microsoft Graphics Component to detect and reject malformed data that could trigger the buffer overflow over the network.
Security SummaryAI
CVE-2025-60724 is a heap-based buffer overflow vulnerability, classified under CWE-122, affecting the Microsoft Graphics Component. Published on 2025-11-11T18:15:41.060, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
The vulnerability enables an unauthorized attacker to execute arbitrary code over a network. Exploitation requires low complexity, no user privileges, no user interaction, and network access, allowing remote attackers to achieve high-impact effects on confidentiality, integrity, and availability, such as full system compromise.
Mitigation details are available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60724.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a critical remote code execution (RCE) in the Microsoft Graphics Component with AV:N/AC:L/PR:N/UI:N, directly enabling exploitation of a public-facing application over the network.