First published: Tue Mar 11 2025(Updated: )
<p>Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows 10 | ||
Microsoft Windows Server | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 10 | ||
Microsoft Windows Server | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows | ||
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-24983 is classified as a use-after-free vulnerability in the Windows Win32 Kernel Subsystem that allows privilege escalation.
To fix CVE-2025-24983, you need to apply the relevant patches provided by Microsoft for your affected Windows version.
CVE-2025-24983 affects multiple versions including Windows 10, Windows Server 2008, and Windows Server 2012 among others.
CVE-2025-24983 is a use-after-free vulnerability that can lead to local privilege escalation.
No, CVE-2025-24983 requires an authorized attacker to exploit the vulnerability for privilege elevation.