PT-2025-46508 · Microsoft · Windows Kernel+1
Published
2025-11-11
·
Updated
2026-02-21
·
CVE-2025-62215
CVSS v3.1
7.0
7.0
High
| Base vector | Vector | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows (affected versions not specified)
Description
A race condition exists within the Windows Kernel, allowing an authorized attacker with local access to elevate privileges. This issue is actively exploited and has been identified as a zero-day vulnerability. Successful exploitation involves winning a race condition, potentially granting the attacker SYSTEM-level privileges. The vulnerability stems from improper synchronization when accessing shared resources, specifically a double free condition. This flaw could allow attackers to hijack system execution flow and gain complete control of the system. Reports indicate that this vulnerability is being actively weaponized by threat actors. Approximately 31 articles have been published regarding this vulnerability from various internet sources.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
LPE
Race Condition
Double Free
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2025-14039
CVE-2025-62215
Affected Products
Windows
Windows Kernel
References · 100
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62215 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-14039 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62215 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-62215 · Security Note
- https://twitter.com/PurpleOps_io/status/1988547410004435138 · Twitter Post
- https://twitter.com/kaly7dev/status/1988858105115938870 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1ov6d7k/microsoft_addresses_63_security_flaws_including · Reddit Post
- https://twitter.com/ggrubamn/status/1989014085401473524 · Twitter Post
- https://t.me/EchelonEyes/4164 · Telegram Post
- https://twitter.com/stooee_/status/1991582411788894481 · Twitter Post
- https://twitter.com/leonov_av/status/1989424994519323086 · Twitter Post
- https://twitter.com/grok/status/1998137473868910925 · Twitter Post
- https://twitter.com/lowcountrycyber/status/1990831400539259300 · Twitter Post