Cyber Posture

CVE-2025-47986

High

Published: 08 July 2025

Published
08 July 2025
Modified
14 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0048 65.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-47986 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows Server 2008. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 35.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely flaw remediation, including patching the use-after-free vulnerability in Universal Print Management Service to prevent local privilege escalation.

prevent

Provides memory protection safeguards to prevent unauthorized code execution resulting from the use-after-free condition in the service.

prevent

Limits privilege escalation damage by enforcing least privilege for processes like the Universal Print Management Service.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Use-after-free in Windows service directly enables local privilege escalation with high impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.

Deeper analysisAI

CVE-2025-47986 is a use-after-free vulnerability (CWE-416) in the Universal Print Management Service, a component of Microsoft Windows operating systems. Published on 2025-07-08, it has a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation triggers a use-after-free condition, enabling privilege escalation in a changed scope (S:C) environment, which can result in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H).

Microsoft's advisory provides details on mitigations and patches in the update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47986.

Details

CWE(s)

Affected Products

microsoft
windows 10 1507
≤ 10.0.10240.21073 · ≤ 10.0.10240.21073
microsoft
windows 10 1607
≤ 10.0.14393.8246 · ≤ 10.0.14393.8246
microsoft
windows 10 1809
≤ 10.0.17763.7558 · ≤ 10.0.17763.7558
microsoft
windows 10 21h2
≤ 10.0.19044.6093
microsoft
windows 10 22h2
≤ 10.0.19045.6093
microsoft
windows 11 22h2
≤ 10.0.22621.5624
microsoft
windows 11 23h2
≤ 10.0.22631.5624
microsoft
windows 11 24h2
≤ 10.0.26100.4652
microsoft
windows server 2008
all versions, r2
microsoft
windows server 2012
all versions, r2
+5 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-24072Same product: Microsoft Windows 10 1507
CVE-2025-24044Same product: Microsoft Windows 10 1507
CVE-2025-21281Same product: Microsoft Windows 10 1507
CVE-2025-24046Same product: Microsoft Windows 10 1507
CVE-2026-27915Same product: Microsoft Windows 10 1607
CVE-2026-32156Same product: Microsoft Windows 10 1607
CVE-2026-27916Same product: Microsoft Windows 10 1607
CVE-2026-27909Same product: Microsoft Windows 10 1607
CVE-2026-27923Same product: Microsoft Windows 10 1607
CVE-2026-24289Same product: Microsoft Windows 10 1607

References