7.8
CVE-2025-24995
- EPSS 0.14%
- Veröffentlicht 11.03.2025 16:59:02
- Zuletzt bearbeitet 03.07.2025 17:19:40
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20947
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.20947
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.7876
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.7876
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.7009
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.7009
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.5608
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.5608
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.5039
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.5039
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.3403
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.7876
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.7009
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.3270
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1486
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.3403
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.344 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
secure@microsoft.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-122 Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().