Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60721: CWE-270: Privilege Context Switching Error in Microsoft Windows 11 Version 25H2

0
High
VulnerabilityCVE-2025-60721cvecve-2025-60721cwe-270
Published: Tue Nov 11 2025 (11/11/2025, 17:59:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:23:08 UTC

Technical Analysis

CVE-2025-60721 is a vulnerability classified under CWE-270, indicating a privilege context switching error in Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw resides in the Windows Administrator Protection mechanism, which is designed to safeguard elevated privilege contexts. Due to improper handling of privilege context switching, an authorized local attacker can exploit this vulnerability to escalate their privileges beyond their current level. The attack vector is local (AV:L), requiring the attacker to have some level of access but not elevated privileges initially (PR:L). No user interaction is necessary (UI:N), and the vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is exploitable with low complexity (AC:L), meaning it does not require specialized conditions or extensive knowledge. Although no public exploits are known at this time, the vulnerability poses a significant risk because successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code with elevated privileges, install persistent malware, or disrupt system operations. The vulnerability was reserved on 2025-09-26 and published on 2025-11-11, with Microsoft as the vendor. No patch links are currently available, indicating that remediation may still be pending. The vulnerability affects a widely deployed operating system version, making it a critical concern for organizations relying on Windows 11 25H2.

Potential Impact

For European organizations, this vulnerability presents a substantial risk due to the widespread adoption of Windows 11 in enterprise environments. Successful exploitation can lead to unauthorized privilege escalation, enabling attackers to bypass security controls, access sensitive data, and execute malicious code with elevated rights. This can compromise the confidentiality of personal and corporate data, the integrity of critical systems, and the availability of IT services. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable, as attackers could leverage this flaw to gain footholds for further lateral movement or ransomware deployment. The local attack vector means that insider threats or attackers who have gained initial access through other means could escalate privileges rapidly. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit development may follow publication. European organizations must prioritize detection and mitigation to prevent potential exploitation that could lead to significant operational disruption and data breaches.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches immediately once released to address CVE-2025-60721. 2. Enforce strict local access controls and limit the number of users with local login privileges to reduce the attack surface. 3. Implement robust endpoint detection and response (EDR) solutions capable of identifying unusual privilege escalation attempts or suspicious process behavior. 4. Conduct regular audits of user privileges and remove unnecessary administrative rights. 5. Employ application whitelisting and least privilege principles to minimize the impact of potential exploits. 6. Use security features such as Windows Defender Credential Guard and virtualization-based security to add layers of protection around privileged processes. 7. Educate IT staff and users about the risks of privilege escalation and the importance of reporting suspicious activity. 8. Consider network segmentation to isolate critical systems and limit lateral movement opportunities for attackers who gain local access. 9. Maintain up-to-date backups and incident response plans to recover quickly in case of compromise. 10. Utilize threat hunting to proactively search for indicators of compromise related to privilege escalation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4a47ab3590319da0fd

Added to database: 11/11/2025, 6:11:22 PM

Last enriched: 11/18/2025, 7:23:08 PM

Last updated: 11/20/2025, 4:03:02 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats