Jan 2025: Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CVE-2025-21334 Published on January 14, 2025
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Known Exploited Vulnerability
This Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.
The following remediation steps are recommended / required by February 4, 2025: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-21334 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2025-21334
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-21334 are published in these products:
Affected Versions
Microsoft Windows 10 Version 21H2:- Version 10.0.19043.0 and below 10.0.19044.5371 is affected.
- Version 10.0.22621.0 and below 10.0.22621.4751 is affected.
- Version 10.0.19045.0 and below 10.0.19045.5371 is affected.
- Version 10.0.26100.0 and below 10.0.26100.2894 is affected.
- Version 10.0.22631.0 and below 10.0.22631.4751 is affected.
- Version 10.0.22631.0 and below 10.0.22631.4751 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1369 is affected.
- Version 10.0.26100.0 and below 10.0.26100.2894 is affected.
- Version 10.0.26100.0 and below 10.0.26100.2894 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.