Cyber Posture

CVE-2025-24043

High

Published: 11 March 2025

Published
11 March 2025
Modified
03 July 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 38.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24043 is a high-severity Improper Verification of Cryptographic Signature (CWE-347) vulnerability in Microsoft Windbg. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-14 (Signed Components) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-24043 by requiring identification, reporting, and correction of the improper cryptographic signature verification flaw in .NET through vendor patching.

preventdetect

Employs cryptographic integrity verification mechanisms to detect and prevent execution of unauthorized or tampered .NET software components despite flawed built-in signature validation.

prevent

Mandates digital signatures for system components, enforcing authenticity checks that address improper signature verification in .NET prior to component use.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables remote code execution over a network via flawed cryptographic signature verification in .NET components, directly mapping to exploitation of public-facing applications for initial access or code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network.

Deeper analysisAI

CVE-2025-24043 is an improper verification of cryptographic signature vulnerability (CWE-347) affecting the .NET framework. Published on 2025-03-11, it enables an authorized attacker to execute code over a network due to flawed signature validation mechanisms within .NET components.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating exploitation requires network access, high attack complexity, and low privileges. A low-privileged authorized attacker can leverage this flaw without user interaction to achieve high-impact confidentiality, integrity, and availability effects, culminating in remote code execution.

For mitigation details, refer to the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24043.

Details

CWE(s)

Affected Products

microsoft
windbg
≤ 1.2502.25002.0

CVEs Like This One

CVE-2026-40372Same vendor: Microsoft
CVE-2026-20947Same vendor: Microsoft
CVE-2026-20856Same vendor: Microsoft
CVE-2025-21385Same vendor: Microsoft
CVE-2025-62549Same vendor: Microsoft
CVE-2025-59287Same vendor: Microsoft
CVE-2025-53766Same vendor: Microsoft
CVE-2026-21532Same vendor: Microsoft
CVE-2025-59228Same vendor: Microsoft
CVE-2025-21355Same vendor: Microsoft

References