CVE-2025-21245
Published: 14 January 2025
Summary
CVE-2025-21245 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Microsoft Windows 10 1507. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 28.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-21245 by requiring timely application of Microsoft patches to remediate the heap-based buffer overflow in Windows Telephony Service.
Implements memory protections like ASLR and DEP that directly counter exploitation of heap-based buffer overflows and out-of-bounds reads leading to RCE.
Enforces input validation to the Windows Telephony Service, addressing malformed network inputs that trigger the buffer overflow vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
RCE via network-accessible Windows service with user interaction directly maps to client-side exploitation and remote service exploitation techniques.
NVD Description
Windows Telephony Service Remote Code Execution Vulnerability
Deeper analysisAI
CVE-2025-21245 is a Remote Code Execution vulnerability affecting the Windows Telephony Service. Published on 2025-01-14, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-122 (Heap-based Buffer Overflow), CWE-125 (Out-of-bounds Read), and NVD-CWE-noinfo.
A remote unauthenticated attacker can exploit this vulnerability over the network with low complexity, provided they trick a user into some interaction, such as clicking a link or processing malicious input. Successful exploitation enables arbitrary code execution on the target Windows system, resulting in high impacts to confidentiality, integrity, and availability.
Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245 provides details on available patches and mitigation recommendations for addressing this vulnerability.
Details
- CWE(s)