CVE-2025-24067
Published: 11 March 2025
Summary
CVE-2025-24067 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Microsoft Windows 10 1607. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 34.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation ensures timely patching of the heap-based buffer overflow vulnerability in Microsoft Streaming Service to prevent local privilege escalation.
Memory protection implements safeguards like ASLR and DEP to block unauthorized code execution from heap buffer overflows.
Least privilege restricts low-privilege local attackers from elevating access even if the buffer overflow is exploited.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap-based buffer overflow in Microsoft Streaming Service directly enables local privilege escalation by allowing low-privileged attackers to execute arbitrary code and gain elevated system privileges.
NVD Description
Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
Deeper analysisAI
CVE-2025-24067 is a heap-based buffer overflow vulnerability, classified under CWE-122, affecting the Microsoft Streaming Service. Published on 2025-03-11T17:16:29.477, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The issue enables an authorized attacker to elevate privileges locally through improper handling of heap memory.
A local attacker possessing low privileges (PR:L) can exploit this vulnerability with low attack complexity and no user interaction. Exploitation requires only local access (AV:L) and results in high impacts across confidentiality, integrity, and availability, allowing the attacker to elevate privileges and potentially gain broader system control.
Microsoft provides mitigation guidance in its Security Update Guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24067.
Details
- CWE(s)