Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60721: CWE-270: Privilege Context Switching Error in Microsoft Windows 11 Version 24H2

0
High
VulnerabilityCVE-2025-60721cvecve-2025-60721cwe-270
Published: Tue Nov 11 2025 (11/11/2025, 17:59:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 24H2

Description

Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:53:27 UTC

Technical Analysis

CVE-2025-60721 is a vulnerability classified under CWE-270, indicating a privilege context switching error in the Windows Administrator Protection mechanism of Microsoft Windows 11 Version 24H2 (build 10.0.26100.0). This flaw allows an authorized attacker with local access and limited privileges to escalate their privileges to higher levels without requiring user interaction. The vulnerability stems from improper handling of privilege context transitions, which can be exploited to bypass security controls designed to restrict administrative operations. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, required privileges, and no user interaction. The impact encompasses full compromise of confidentiality, integrity, and availability of affected systems. Although no public exploits are known at this time, the vulnerability's nature makes it a significant risk for environments where local access is possible. The vulnerability was reserved in late September 2025 and published in November 2025, with no patches currently available, indicating a window of exposure. Organizations using Windows 11 24H2 should be vigilant and implement compensating controls until Microsoft releases an official fix.

Potential Impact

The vulnerability allows an attacker with authorized local access to escalate privileges, potentially gaining full administrative control over affected Windows 11 systems. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of system availability, and complete compromise of system integrity. For enterprises, this elevates the risk of insider threats or attackers who have gained limited footholds through other means. Critical infrastructure, government, financial, and healthcare organizations are particularly at risk due to the potential for widespread impact and data breaches. The absence of a patch increases exposure time, and the ease of exploitation (low complexity, no user interaction) heightens the threat. The vulnerability could be leveraged in targeted attacks or combined with other exploits to deepen system compromise.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict local access controls, ensuring only trusted users have physical or remote local access to Windows 11 24H2 systems. Employ the principle of least privilege rigorously, removing unnecessary administrative rights from users and service accounts. Enable and monitor Windows security auditing to detect unusual privilege escalation attempts. Use endpoint detection and response (EDR) tools to identify suspicious behavior indicative of privilege escalation. Consider isolating critical systems to reduce the attack surface and applying application whitelisting to prevent unauthorized code execution. Regularly update and review group policies to restrict administrative privilege delegation. Once Microsoft releases a patch, prioritize immediate deployment across all affected systems. Additionally, educate users about the risks of local access and enforce strong authentication mechanisms to limit unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4a47ab3590319da0fd

Added to database: 11/11/2025, 6:11:22 PM

Last enriched: 2/27/2026, 5:53:27 AM

Last updated: 3/25/2026, 12:15:08 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses