Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24084: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 11 version 22H2

0
High
VulnerabilityCVE-2025-24084cvecve-2025-24084cwe-822
Published: Tue Mar 11 2025 (03/11/2025, 16:59:17 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 11 version 22H2

Description

Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:00:24 UTC

Technical Analysis

CVE-2025-24084 is a vulnerability identified in Microsoft Windows 11 version 22H2, specifically within the Windows Subsystem for Linux (WSL) component. The issue is classified as an untrusted pointer dereference (CWE-822), which occurs when the system dereferences a pointer that can be controlled or influenced by an attacker without proper validation. This flaw enables an unauthorized attacker to execute arbitrary code locally on the affected system. The vulnerability does not require any privileges or user interaction, making it particularly dangerous in environments where multiple users have local access or where malware could leverage this flaw to escalate privileges or persist. The CVSS v3.1 base score of 8.4 reflects high severity, with impacts on confidentiality, integrity, and availability (all rated high). The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), meaning the exploit affects the vulnerable component without impacting other components. Although no public exploits are known at this time, the vulnerability's characteristics suggest it could be leveraged for full system compromise if exploited. The vulnerability was reserved in January 2025 and published in March 2025, indicating recent discovery and disclosure. No patches are currently linked, so organizations must monitor for updates from Microsoft. The vulnerability is particularly relevant for environments using WSL, which is increasingly common among developers and IT professionals for running Linux tools on Windows.

Potential Impact

For European organizations, the impact of CVE-2025-24084 is significant due to the widespread adoption of Windows 11 version 22H2 in enterprise and government sectors. The ability for an unauthorized local attacker to execute arbitrary code without privileges or user interaction means that insider threats or malware that gains limited local access could fully compromise affected systems. This could lead to data breaches, disruption of critical services, and loss of system integrity and availability. Organizations relying on WSL for development, automation, or operational tasks are particularly vulnerable. The compromise of systems in critical infrastructure sectors such as finance, healthcare, energy, and government could have cascading effects on national security and economic stability. Additionally, the lack of known exploits currently provides a window for proactive mitigation but also means attackers may be actively developing exploits. The vulnerability's local attack vector limits remote exploitation but does not eliminate risk in environments with shared access or where attackers can gain initial footholds through other means.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates for Windows 11 version 22H2 and WSL as soon as they become available. 2. Restrict local system access to trusted personnel only, employing strict access controls and user account management to minimize the risk of unauthorized local exploitation. 3. Disable or limit the use of Windows Subsystem for Linux in environments where it is not essential, reducing the attack surface. 4. Implement endpoint detection and response (EDR) solutions capable of monitoring for unusual local process behavior or code execution attempts related to WSL. 5. Conduct regular security audits and vulnerability assessments focusing on local privilege escalation vectors and pointer dereference issues. 6. Educate users and administrators about the risks associated with local access vulnerabilities and enforce the principle of least privilege. 7. Use application whitelisting and sandboxing techniques to contain potential exploitation attempts within WSL or related processes. 8. Maintain comprehensive logging and alerting to detect suspicious activities that could indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.738Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb35b

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/14/2026, 9:00:24 AM

Last updated: 3/26/2026, 10:37:32 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses