CVE-2025-50165
Published: 12 August 2025
Summary
CVE-2025-50165 is a critical-severity Untrusted Pointer Dereference (CWE-822) vulnerability in Microsoft Windows 11 24H2. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 9.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely patching and flaw remediation for vulnerabilities like CVE-2025-50165 in the Microsoft Graphics Component.
Provides memory protection mechanisms such as ASLR, DEP, and stack guards to block exploitation of untrusted pointer dereference flaws.
Enforces network boundary protections to restrict unauthorized remote access required to exploit the graphics component vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated network RCE in exposed component directly matches initial access via public-facing application exploitation.
NVD Description
Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-50165, published on 2025-08-12, is an untrusted pointer dereference vulnerability (CWE-822, CWE-908) in the Microsoft Graphics Component. This flaw allows an unauthorized attacker to execute code over a network and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for remote exploitation with high impact on confidentiality, integrity, and availability.
The vulnerability can be exploited by any unauthorized attacker with network access, requiring no privileges, low attack complexity, and no user interaction. Successful exploitation enables arbitrary code execution on the targeted system, potentially leading to full compromise.
For details on patches and mitigation, refer to the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165.
Details
- CWE(s)