Jan 2025: Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CVE-2025-21334 Published on January 14, 2025

Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability

Vendor Advisory NVD

Known Exploited Vulnerability

This Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.

The following remediation steps are recommended / required by February 4, 2025: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2025-21334 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2025-21334

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 
 
 

Affected Versions

Microsoft Windows 10 Version 21H2: Microsoft Windows 10 Version 22H2: Microsoft Windows 11 version 22H2: Microsoft Windows 11 version 22H3: Microsoft Windows 11 Version 23H2: Microsoft Windows 11 Version 24H2: Microsoft Windows Server 2022, 23H2 Edition (Server Core installation): Microsoft Windows Server 2025: Microsoft Windows Server 2025 (Server Core installation):

Exploit Probability

EPSS
7.56%
Percentile
91.68%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.