CVE-2025-24046
Published: 11 March 2025
Summary
CVE-2025-24046 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows 10 1507. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 32.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and remediation of flaws such as the use-after-free vulnerability in Microsoft Streaming Service to eliminate the exploitable condition.
Implements memory safeguards like address space layout randomization, data execution prevention, and stack canaries to protect against use-after-free exploitation attempts.
Enforces least privilege on system processes including the Microsoft Streaming Service, limiting the scope and impact of local privilege escalation by low-privilege attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free vulnerability in Microsoft Streaming Service allows local low-privileged attackers to elevate privileges, directly mapping to T1068 Exploitation for Privilege Escalation.
NVD Description
Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
Deeper analysisAI
CVE-2025-24046 is a use-after-free vulnerability (CWE-416) in the Microsoft Streaming Service. Published on March 11, 2025, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
The vulnerability can be exploited by an authorized local attacker with low privileges. Successful exploitation allows the attacker to elevate privileges on the affected system.
Microsoft's security advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24046 provides details on patches and mitigation guidance. Security practitioners should consult this resource for deployment instructions and apply updates promptly.
Details
- CWE(s)