Skip to main content

CVE-2025-21335: CWE-416: Use After Free in Microsoft Windows 10 Version 21H2

High
VulnerabilityCVE-2025-21335cvecve-2025-21335cwe-416
Published: Tue Jan 14 2025 (01/14/2025, 18:04:17 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 21H2

Description

Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 08/05/2025, 00:59:23 UTC

Technical Analysis

CVE-2025-21335 is a high-severity use-after-free vulnerability (CWE-416) found in the Windows Hyper-V NT Kernel Integration Virtual Service Provider (VSP) component on Microsoft Windows 10 Version 21H2 (build 10.0.19043.0). This vulnerability allows an attacker with limited privileges (PR:L) and local access (AV:L) to elevate their privileges without requiring user interaction (UI:N). The flaw arises from improper handling of memory in the Hyper-V VSP driver, leading to use-after-free conditions where freed memory is accessed, potentially resulting in arbitrary code execution or system compromise. The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation can grant attackers SYSTEM-level privileges, enabling full control over the affected system. The CVSS v3.1 base score of 7.8 reflects the significant risk posed by this vulnerability. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for environments utilizing Windows 10 21H2 with Hyper-V enabled. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring. Given that Hyper-V is commonly used for virtualization and containerization in enterprise environments, exploitation could allow attackers to escape virtual machine isolation or compromise host systems, leading to widespread impact in corporate networks.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for enterprises relying on Windows 10 21H2 with Hyper-V for virtualization infrastructure. Successful exploitation could lead to privilege escalation, allowing attackers to bypass security controls, access sensitive data, disrupt services, or deploy further malware. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. The compromise of Hyper-V hosts could also impact cloud service providers and managed service providers operating in Europe, potentially affecting multiple customers. Additionally, the vulnerability could be leveraged in targeted attacks against organizations with high-value assets or critical infrastructure, amplifying the potential damage. The absence of known exploits currently provides a window for proactive defense, but the high severity score and ease of local exploitation necessitate immediate attention to prevent future attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Immediately inventory and identify all systems running Windows 10 Version 21H2 with Hyper-V enabled to assess exposure. 2) Apply any available security updates or patches from Microsoft as soon as they are released; monitor Microsoft security advisories closely. 3) Restrict local access to systems running vulnerable versions by enforcing strict access controls and limiting administrative privileges to trusted personnel only. 4) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 5) Disable Hyper-V on systems where virtualization is not required to reduce the attack surface. 6) Implement network segmentation to isolate critical systems and limit lateral movement in case of compromise. 7) Conduct regular security awareness training to prevent unauthorized physical or local access. 8) Monitor system logs and security alerts for signs of privilege escalation or suspicious activity related to Hyper-V components. These targeted measures go beyond generic advice by focusing on the specific attack vector and environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.351Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881726ad5a09ad0088bbc8

Added to database: 7/29/2025, 12:34:46 AM

Last enriched: 8/5/2025, 12:59:23 AM

Last updated: 8/27/2025, 11:04:37 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats