Cyber Posture

CVE-2025-24983

HighCISA KEVActive Exploitation

Published: 11 March 2025

Published
11 March 2025
Modified
27 October 2025
KEV Added
11 March 2025
Patch
CVSS Score 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0147 81.1th percentile
Risk Priority 35 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24983 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows Server 2008. Its CVSS base score is 7.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 18.9% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of system flaws such as the use-after-free vulnerability in the Windows Win32 Kernel Subsystem.

prevent

Implements memory protection mechanisms like ASLR and DEP that mitigate exploitation of use-after-free vulnerabilities by preventing unauthorized code execution.

prevent

Enforces least privilege to restrict the initial access of low-privilege local attackers and limit damage from successful privilege escalation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Use-after-free in Windows Win32 Kernel Subsystem directly enables local privilege escalation from low-privileged context to high impacts on C/I/A.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.

Deeper analysisAI

CVE-2025-24983 is a use-after-free vulnerability (CWE-416) in the Windows Win32 Kernel Subsystem. Published on 2025-03-11, it carries a CVSS v3.1 base score of 7.0 (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) and affects Windows operating systems where the Win32 Kernel Subsystem is present.

The vulnerability can be exploited by an authorized local attacker with low privileges. Exploitation requires high attack complexity and local access but no user interaction. Successful exploitation enables privilege escalation, granting high impacts on confidentiality, integrity, and availability.

Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983 provides details on patches and remediation. The vulnerability is referenced in CISA's Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24983.

Details

CWE(s)
KEV Date Added
11 March 2025

Affected Products

microsoft
windows 10 1507
≤ 10.0.10240.20947 · ≤ 10.0.10240.20947
microsoft
windows 10 1607
≤ 10.0.14393.7876 · ≤ 10.0.14393.7876
microsoft
windows server 2008
all versions, r2
microsoft
windows server 2012
all versions, r2
microsoft
windows server 2016
≤ 10.0.14393.7876

CVEs Like This One

CVE-2025-21335Same vendor: Microsoftboth on KEV
CVE-2025-21334Same vendor: Microsoftboth on KEV
CVE-2025-62221Same vendor: Microsoftboth on KEV
CVE-2025-24072Same product: Microsoft Windows 10 1507
CVE-2025-47986Same product: Microsoft Windows 10 1507
CVE-2025-59230Same product: Microsoft Windows 10 1507both on KEV
CVE-2025-24990Same product: Microsoft Windows 10 1507both on KEV
CVE-2026-21235Same product: Microsoft Windows 10 1607
CVE-2025-21418Same product: Microsoft Windows 10 1607both on KEV
CVE-2025-24044Same product: Microsoft Windows 10 1507

References