7.8

CVE-2025-21418

Warnung
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrosoftWindows 10 1607 HwPlatformx64 Version < 10.0.10240.20915
MicrosoftWindows 10 1607 HwPlatformx86 Version < 10.0.10240.20915
MicrosoftWindows 10 1809 HwPlatformx64 Version < 10.0.17763.6893
MicrosoftWindows 10 1809 HwPlatformx86 Version < 10.0.17763.6893
MicrosoftWindows 10 21h2 Version < 10.0.19044.5487
MicrosoftWindows 10 22h2 Version < 10.0.19045.5487
MicrosoftWindows 11 22h2 Version < 10.0.22621.4890
MicrosoftWindows 11 23h2 Version < 10.0.22631.4890
MicrosoftWindows 11 24h2 Version < 10.0.26100.3107
MicrosoftWindows Server 2008 Version- Updatesp2
MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
MicrosoftWindows Server 2016 Version < 10.0.14393.7785
MicrosoftWindows Server 2019 Version < 10.0.17763.6893
MicrosoftWindows Server 2022 Version < 10.0.20348.3148
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.1425
MicrosoftWindows Server 2025 Version < 10.0.26100.3107

11.02.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability

Schwachstelle

Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.

Beschreibung

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 8.74% 0.921
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secure@microsoft.com 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-122 Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().