Cyber Posture

CVE-2025-62221

HighCISA KEVActive Exploitation

Published: 09 December 2025

Published
09 December 2025
Modified
10 December 2025
KEV Added
09 December 2025
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0223 84.7th percentile
Risk Priority 37 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-62221 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows 10 1809. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 15.3% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation of identified flaws like this use-after-free vulnerability through patching, as prioritized by CISA KEV and Microsoft guidance.

prevent

Implements memory safeguards such as DEP and ASLR to mitigate use-after-free exploits that enable privilege escalation in the driver.

detect

Requires vulnerability scanning to identify affected Windows systems running the vulnerable Cloud Files Mini Filter Driver for prompt remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Use-after-free vulnerability in Windows Cloud Files Mini Filter Driver enables local privilege escalation from low privileges, directly mapping to Exploitation for Privilege Escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Deeper analysisAI

CVE-2025-62221 is a use-after-free vulnerability (CWE-416) in the Windows Cloud Files Mini Filter Driver. This flaw affects Windows systems utilizing the driver, with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). It was published on 2025-12-09.

A local attacker with low privileges can exploit this vulnerability due to its low attack complexity and lack of required user interaction. Successful exploitation enables privilege escalation, granting high-impact access to confidentiality, integrity, and availability of the system.

Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221 provides details on patches and mitigation steps. The vulnerability is also listed in CISA's Known Exploited Vulnerabilities catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-62221, indicating active exploitation in the wild.

Security practitioners should prioritize patching affected Windows systems, as real-world exploitation has been observed per CISA.

Details

CWE(s)
KEV Date Added
09 December 2025

Affected Products

microsoft
windows 10 1809
≤ 10.0.17763.8146 · ≤ 10.0.17763.8146
microsoft
windows 10 21h2
≤ 10.0.19044.6691
microsoft
windows 10 22h2
≤ 10.0.19045.6691
microsoft
windows 11 23h2
≤ 10.0.22631.6345
microsoft
windows 11 24h2
≤ 10.0.26100.7392
microsoft
windows 11 25h2
≤ 10.0.26200.7392
microsoft
windows server 2019
≤ 10.0.17763.8146
microsoft
windows server 2022
≤ 10.0.20348.4467
microsoft
windows server 2022 23h2
≤ 10.0.25398.2025
microsoft
windows server 2025
≤ 10.0.26100.7392

CVEs Like This One

CVE-2025-21334Same product: Microsoft Windows 10 21H2both on KEV
CVE-2025-21335Same product: Microsoft Windows 10 21H2both on KEV
CVE-2026-20865Same product: Microsoft Windows 10 1809
CVE-2026-20923Same product: Microsoft Windows 10 1809
CVE-2025-62215Same product: Microsoft Windows 10 1809both on KEV
CVE-2026-24292Same product: Microsoft Windows 10 1809
CVE-2026-32078Same product: Microsoft Windows 10 1809
CVE-2026-21519Same product: Microsoft Windows 10 1809both on KEV
CVE-2026-20822Same product: Microsoft Windows 10 1809
CVE-2025-21367Same product: Microsoft Windows 10 1809

References