Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21333: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 21H2

0
High
VulnerabilityCVE-2025-21333cvecve-2025-21333cwe-122
Published: Tue Jan 14 2025 (01/14/2025, 18:04:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 21H2

Description

Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:34:54 UTC

Technical Analysis

CVE-2025-21333 is a heap-based buffer overflow vulnerability classified under CWE-122, located in the Windows Hyper-V NT Kernel Integration Virtual Service Provider (VSP) component of Microsoft Windows 10 Version 21H2 (build 10.0.19044.0). The vulnerability arises from improper handling of memory buffers within the Hyper-V VSP, which facilitates communication between the host and guest virtual machines. An attacker with limited privileges on the host system can exploit this flaw by crafting malicious input that triggers the overflow, leading to arbitrary code execution in kernel mode. This results in an elevation of privilege, allowing the attacker to gain SYSTEM-level access. The vulnerability does not require user interaction but does require local access with low privileges, making it a significant threat in multi-tenant or shared environments where Hyper-V is enabled. The CVSS v3.1 base score is 7.8, indicating high severity, with metrics AV:L (local attack vector), AC:L (low complexity), PR:L (low privileges required), UI:N (no user interaction), and full impact on confidentiality, integrity, and availability. Although no public exploits are known at this time, the vulnerability's nature and impact make it a critical concern for organizations relying on Windows 10 21H2 with Hyper-V virtualization.

Potential Impact

The exploitation of CVE-2025-21333 can have severe consequences for organizations worldwide. By enabling privilege escalation to SYSTEM level, attackers can bypass security controls, install persistent malware, exfiltrate sensitive data, or disrupt critical services. In virtualized environments, this vulnerability undermines the isolation between virtual machines and the host, potentially allowing attackers to compromise multiple guest VMs or the host itself. This risk is particularly acute in cloud service providers, data centers, and enterprises using Hyper-V for server virtualization or desktop virtualization. The compromise of confidentiality, integrity, and availability could lead to data breaches, operational downtime, and loss of trust. Given the widespread deployment of Windows 10 21H2 and Hyper-V in enterprise environments, the potential attack surface is substantial. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability remains a high-priority threat.

Mitigation Recommendations

Organizations should implement the following specific mitigation strategies: 1) Monitor Microsoft security advisories closely and apply official patches or updates for Windows 10 Version 21H2 Hyper-V components as soon as they are released. 2) Restrict local access to Hyper-V hosts by enforcing strict access control policies, limiting administrative privileges, and using just-in-time access models. 3) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 4) Harden Hyper-V configurations by disabling unnecessary integration services or features that are not required for operation. 5) Segment virtualized environments to minimize lateral movement if a host is compromised. 6) Conduct regular vulnerability assessments and penetration testing focused on virtualization infrastructure to identify potential exploitation vectors. 7) Educate system administrators about the risks of local privilege escalation vulnerabilities and the importance of timely patching and secure configuration. These measures, combined with vigilant monitoring, will reduce the risk of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.351Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881726ad5a09ad0088bbc0

Added to database: 7/29/2025, 12:34:46 AM

Last enriched: 2/26/2026, 11:34:54 PM

Last updated: 3/24/2026, 3:08:26 PM

Views: 156

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses