CVE-2025-21379
Published: 11 February 2025
Summary
CVE-2025-21379 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows 11 24H2. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 20.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching directly eliminates the remote code execution vulnerability in the DHCP Client Service.
Memory protection mechanisms prevent successful exploitation of the use-after-free (CWE-416) flaw in the DHCP Client Service.
Boundary protection via network segmentation limits the adjacent network access (AV:A) required to deliver the malicious DHCP response.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote code execution vulnerability in the DHCP Client Service (a client application), directly enabling Exploitation for Client Execution via crafted network responses.
NVD Description
DHCP Client Service Remote Code Execution Vulnerability
Deeper analysisAI
CVE-2025-21379 is a Remote Code Execution vulnerability in the DHCP Client Service. Published on 2025-02-11T18:15:36.590, it carries a CVSS v3.1 base score of 7.1 (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) and is linked to CWE-416 as well as NVD-CWE-noinfo.
Exploitation requires an attacker with adjacent network access (AV:A) and involves high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). Successful attacks result in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) with unchanged scope (S:U), enabling remote code execution on affected systems.
The Microsoft Security Response Center provides guidance on this vulnerability, including patch information, at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21379.
Details
- CWE(s)