CVE-2025-21200
Published: 11 February 2025
Summary
CVE-2025-21200 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Microsoft Windows Server 2008. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 37.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates CVE-2025-21200 by requiring timely application of Microsoft patches for the heap-based buffer overflow in Windows Telephony Service.
Implements memory protections like ASLR and DEP that directly mitigate remote code execution from the heap-based buffer overflow in CVE-2025-21200.
Requires validation of inputs to the Windows Telephony Service to prevent heap-based buffer overflows exploited in CVE-2025-21200.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated heap buffer overflow in Windows Telephony Service directly enables exploitation of a remote Windows service to achieve RCE.
NVD Description
Windows Telephony Service Remote Code Execution Vulnerability
Deeper analysisAI
CVE-2025-21200 is a Remote Code Execution vulnerability in the Windows Telephony Service. Published on 2025-02-11, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-122 (Heap-based Buffer Overflow) and NVD-CWE-noinfo.
A remote unauthenticated attacker can exploit this vulnerability over the network with low attack complexity, provided they can trick a user into some form of interaction. Successful exploitation enables the attacker to achieve high impacts on confidentiality, integrity, and availability, allowing remote code execution on the affected Windows system.
Microsoft's update guide provides details on mitigations and patches for this vulnerability at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21200.
Details
- CWE(s)