CVE-2025-62215
- EPSS 0.76%
- Published 11.11.2025 18:15:48
- Last modified 14.11.2025 02:00:02
- Source secure@microsoft.com
- CVE-Watchlists
- Open
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.12.11.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows Race Condition Vulnerability
VulnerabilityMicrosoft Windows Kernel contains a race condition vulnerability that allows a local attacker with low-level privileges to escalate privileges. Successful exploitation of this vulnerability could enable the attacker to gain SYSTEM-level access.
DescriptionApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Required actions| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.76% | 0.727 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| secure@microsoft.com | 7 | 1 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.