CVE-2025-24983
Published: 11 March 2025
Summary
CVE-2025-24983 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows Server 2008. Its CVSS base score is 7.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 18.9% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and correction of system flaws such as the use-after-free vulnerability in the Windows Win32 Kernel Subsystem.
Implements memory protection mechanisms like ASLR and DEP that mitigate exploitation of use-after-free vulnerabilities by preventing unauthorized code execution.
Enforces least privilege to restrict the initial access of low-privilege local attackers and limit damage from successful privilege escalation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in Windows Win32 Kernel Subsystem directly enables local privilege escalation from low-privileged context to high impacts on C/I/A.
NVD Description
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
Deeper analysisAI
CVE-2025-24983 is a use-after-free vulnerability (CWE-416) in the Windows Win32 Kernel Subsystem. Published on 2025-03-11, it carries a CVSS v3.1 base score of 7.0 (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) and affects Windows operating systems where the Win32 Kernel Subsystem is present.
The vulnerability can be exploited by an authorized local attacker with low privileges. Exploitation requires high attack complexity and local access but no user interaction. Successful exploitation enables privilege escalation, granting high impacts on confidentiality, integrity, and availability.
Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983 provides details on patches and remediation. The vulnerability is referenced in CISA's Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24983.
Details
- CWE(s)
- KEV Date Added
- 11 March 2025