Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21367: CWE-416: Use After Free in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-21367cvecve-2025-21367cwe-416
Published: Tue Feb 11 2025 (02/11/2025, 17:58:34 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:01:26 UTC

Technical Analysis

CVE-2025-21367 is a use-after-free vulnerability classified under CWE-416 affecting the Win32 Kernel Subsystem in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to execute an elevation of privilege attack by exploiting a memory corruption flaw in the kernel. The flaw arises when the kernel improperly manages memory objects, leading to a use-after-free condition that can be leveraged to execute arbitrary code with kernel-level privileges. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting high severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack vector is local (AV:L), meaning the attacker must have some access to the system but can escalate privileges without further user interaction. No known exploits have been reported in the wild, and no patches are currently available, though the vulnerability was published on February 11, 2025. The vulnerability's exploitation could allow attackers to bypass security boundaries, gain SYSTEM-level privileges, and fully compromise affected systems. This is particularly critical for environments relying on legacy Windows 10 1809 installations, which are no longer mainstream but may still be in use in some enterprises.

Potential Impact

For European organizations, the impact of CVE-2025-21367 is significant. The vulnerability enables local attackers to escalate privileges to SYSTEM level, potentially allowing full control over affected machines. This can lead to unauthorized access to sensitive data, disruption of critical services, and deployment of further malware or ransomware. Organizations with legacy systems running Windows 10 Version 1809, especially in sectors such as finance, healthcare, government, and critical infrastructure, face heightened risks. The compromise of such systems could result in data breaches, operational downtime, and regulatory non-compliance under GDPR due to loss of data confidentiality and integrity. Additionally, the local attack vector means insider threats or attackers who gain initial foothold through other means can leverage this vulnerability to deepen their access. The absence of patches increases the window of exposure, emphasizing the need for proactive mitigation.

Mitigation Recommendations

Given the lack of official patches, European organizations should prioritize upgrading affected systems to a supported and fully patched version of Windows, such as Windows 10 21H2 or later, or Windows 11. Where immediate upgrade is not feasible, organizations should implement strict access controls to limit local user privileges and reduce the number of users with local login rights. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious kernel-level activities indicative of exploitation attempts. Regularly audit and harden system configurations to minimize attack surface. Network segmentation can help contain potential compromises. Additionally, maintain up-to-date backups and incident response plans to mitigate impact if exploitation occurs. Organizations should monitor Microsoft security advisories closely for forthcoming patches and apply them immediately upon release.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.360Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f00058703ef3fc98029

Added to database: 12/17/2025, 10:30:24 PM

Last enriched: 12/17/2025, 11:01:26 PM

Last updated: 12/19/2025, 10:10:54 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats