CVE-2025-24983 vulnerability in Microsoft Products
Published on March 11, 2025


Known Exploited Vulnerability
This Microsoft Windows Win32k Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Win32 Kernel Subsystem contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.
The following remediation steps are recommended / required by April 1, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2025-24983 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. It has an exploitability score of 1.0 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-24983 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2025-24983
You can be notified by stack.watch whenever vulnerabilities like CVE-2025-24983 are published in these products:
What versions are vulnerable to CVE-2025-24983?
-
Microsoft Windows Server 2008 Version r2 sp1 x64
-
Microsoft Windows Server 2012 Version r2
-
Microsoft Windows Server 2012 Version -
-
Microsoft Windows Server 2008 Version - sp2 x64
-
Microsoft Windows Server 2008 Version - sp2 x86
-
Microsoft Windows 10 1507 Fixed in Version 10.0.10240.20947 x64
-
Microsoft Windows 10 1507 Fixed in Version 10.0.10240.20947 x86
-
Microsoft Windows 10 1607 Fixed in Version 10.0.14393.7876 x64
-
Microsoft Windows 10 1607 Fixed in Version 10.0.14393.7876 x86
-
Microsoft Windows Server 2016 Fixed in Version 10.0.14393.7876