7.8

CVE-2025-62221

Warnung
Medienbericht
Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrosoftWindows 10 1809 HwPlatformx64 Version < 10.0.17763.8146
MicrosoftWindows 10 1809 HwPlatformx86 Version < 10.0.17763.8146
MicrosoftWindows 10 21h2 Version < 10.0.19044.6691
MicrosoftWindows 10 22h2 Version < 10.0.19045.6691
MicrosoftWindows 11 23h2 Version < 10.0.22631.6345
MicrosoftWindows 11 24h2 Version < 10.0.26100.7392
MicrosoftWindows 11 25h2 Version < 10.0.26200.7392
MicrosoftWindows Server 2019 Version < 10.0.17763.8146
MicrosoftWindows Server 2022 Version < 10.0.20348.4467
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.2025
MicrosoftWindows Server 2025 Version < 10.0.26100.7392

09.12.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows Use After Free Vulnerability

Schwachstelle

Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 8.21% 0.919
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secure@microsoft.com 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.