Cyber Posture

CVE-2025-24999

High

Published: 12 August 2025

Published
12 August 2025
Modified
14 August 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0052 66.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24999 is a high-severity Improper Access Control (CWE-284) vulnerability in Microsoft Sql Server 2016. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 33.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved access authorizations to mitigate the improper access control allowing privilege escalation in SQL Server.

prevent

Applies least privilege to restrict low-privileged attackers from elevating to higher privileges over the network.

prevent

Remediates the specific SQL Server vulnerability through timely patching as recommended by the Microsoft advisory.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct privilege escalation via network-accessible improper access control flaw in SQL Server matches Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

Deeper analysisAI

CVE-2025-24999 is an improper access control vulnerability (CWE-284) in SQL Server that enables an authorized attacker to elevate privileges over a network. Published on 2025-08-12T18:15:27.500, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited by an attacker with low privileges (PR:L) who has network access (AV:N) to the affected SQL Server instance, requiring low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows privilege escalation within the unchanged scope (S:U), potentially granting the attacker high-level control over the system, including unauthorized data access, modification, or disruption.

For mitigation details, refer to the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999, which provides guidance on patches and workarounds.

Details

CWE(s)

Affected Products

microsoft
sql server 2016
13.0.6300.2 — 13.0.6465.1 · 13.0.7000.253 — 13.0.7060.1
microsoft
sql server 2017
14.0.1000.169 — 14.0.2080.1 · 14.0.3006.16 — 14.0.3500.1
microsoft
sql server 2019
15.0.2000.5 — 15.0.2140.1 · 15.0.4003.23 — 15.0.4440.1
microsoft
sql server 2022
16.0.1000.6 — 16.0.1145.1 · 16.0.4003.1 — 16.0.4210.1

CVEs Like This One

CVE-2026-21262Same product: Microsoft Sql Server 2016
CVE-2025-49758Same product: Microsoft Sql Server 2016
CVE-2025-59499Same product: Microsoft Sql Server 2016
CVE-2025-49759Same product: Microsoft Sql Server 2016
CVE-2025-53727Same product: Microsoft Sql Server 2016
CVE-2026-26116Same product: Microsoft Sql Server 2016
CVE-2026-26115Same product: Microsoft Sql Server 2016
CVE-2025-55227Same product: Microsoft Sql Server 2016
CVE-2025-54914Same vendor: Microsoft
CVE-2025-21359Same vendor: Microsoft

References