CVE-2025-21307
Published: 14 January 2025
Summary
CVE-2025-21307 is a critical-severity Use After Free (CWE-416) vulnerability in Microsoft Windows 10 1507. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 6.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-7 (Least Functionality).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the use-after-free vulnerability in the Windows RMCAST driver by applying vendor-provided patches, preventing remote code execution.
Limits attack surface by configuring the system to disable the RMCAST driver and other unnecessary multicast transport capabilities when not required.
Monitors and controls network communications at boundaries to block unauthorized inbound multicast traffic that could trigger the RMCAST remote code execution vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated RCE in network-exposed Windows driver directly enables exploitation of public-facing applications (T1190) and facilitates arbitrary code execution via command/scripting interpreters like PowerShell (T1059.001).
NVD Description
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability
Deeper analysisAI
CVE-2025-21307 is a Remote Code Execution vulnerability affecting the Windows Reliable Multicast Transport Driver (RMCAST). Published on January 14, 2025, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical severity and linking it to CWE-416.
The vulnerability enables remote exploitation over the network by unauthenticated attackers requiring no privileges or user interaction, with low attack complexity. Successful exploitation grants attackers remote code execution capabilities, resulting in high impacts to confidentiality, integrity, and availability.
The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307 details mitigation strategies and available patches.
Details
- CWE(s)