Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24076: CWE-284: Improper Access Control in Microsoft Windows 11 version 22H2

0
High
VulnerabilityCVE-2025-24076cvecve-2025-24076cwe-284
Published: Tue Mar 11 2025 (03/11/2025, 16:59:16 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 11 version 22H2

Description

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:58:42 UTC

Technical Analysis

CVE-2025-24076 is an improper access control vulnerability classified under CWE-284 affecting the Windows Cross Device Service in Microsoft Windows 11 version 22H2 (build 10.0.22621.0). The flaw allows an attacker who already has authorized local access to the system to elevate their privileges beyond their assigned rights. The vulnerability arises because the Cross Device Service fails to enforce proper access control checks, enabling privilege escalation. The CVSS 3.1 base score is 7.3, reflecting high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), and user interaction (UI:R). The impact includes high confidentiality, integrity, and availability consequences, meaning an attacker could gain administrative control, access sensitive data, modify system configurations, or disrupt system operations. Although no public exploits are known yet, the vulnerability is publicly disclosed and should be considered a significant risk. The vulnerability affects Windows 11 22H2 specifically, which is widely deployed in enterprise and consumer environments. The Cross Device Service is a component that facilitates communication and synchronization between devices, making it a critical service whose compromise could have broad implications.

Potential Impact

For European organizations, this vulnerability poses a significant risk as it can lead to unauthorized privilege escalation on Windows 11 22H2 systems. This can result in attackers gaining administrative control, allowing them to access sensitive corporate data, alter system configurations, install persistent malware, or disrupt business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and the potential for operational disruption. The requirement for local access and user interaction somewhat limits remote exploitation but insider threats or attackers who have gained initial footholds through phishing or other means could leverage this vulnerability to escalate privileges. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate it, as threat actors may develop exploits following public disclosure. The vulnerability's impact on confidentiality, integrity, and availability makes it a critical concern for maintaining compliance with European data protection regulations such as GDPR and for ensuring operational resilience.

Mitigation Recommendations

1. Apply official Microsoft patches immediately once they are released for CVE-2025-24076 to remediate the improper access control issue. 2. Until patches are available, restrict local user permissions to the minimum necessary, avoiding granting unnecessary privileges that could be escalated. 3. Implement strict local access controls and monitor local user activities for unusual behavior indicative of privilege escalation attempts. 4. Use endpoint detection and response (EDR) solutions to detect anomalous activities related to the Cross Device Service or privilege escalation patterns. 5. Educate users about the risks of social engineering and phishing that could lead to initial local access, thereby reducing the attack surface. 6. Employ application whitelisting and system hardening to limit the execution of unauthorized code. 7. Regularly audit and review user privileges and service configurations related to the Cross Device Service. 8. Consider network segmentation to limit the impact of compromised endpoints. These steps go beyond generic advice by focusing on controlling local access, monitoring specific service behavior, and preparing for patch deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.737Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb340

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/14/2026, 8:58:42 AM

Last updated: 3/25/2026, 2:45:20 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses