CVE-2025-32709 vulnerability in Microsoft Products
Published on May 13, 2025


Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Known Exploited Vulnerability
This Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator.
The following remediation steps are recommended / required by June 3, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
Products Associated with CVE-2025-32709
You can be notified by stack.watch whenever vulnerabilities like CVE-2025-32709 are published in these products:
What versions are vulnerable to CVE-2025-32709?
-
Microsoft Windows Server 2012 Version r2
-
Microsoft Windows Server 2012 Version -
-
Microsoft Windows 10 1607 Fixed in Version 10.0.14393.8066
-
Microsoft Windows 10 1809 Fixed in Version 10.0.17763.7314 x64
-
Microsoft Windows 10 1809 Fixed in Version 10.0.17763.7314 x86
-
Microsoft Windows 10 21h2 Fixed in Version 10.0.19044.5854
-
Microsoft Windows 10 22h2 Fixed in Version 10.0.19045.5854
-
Microsoft Windows 11 22h2 Fixed in Version 10.0.22621.5335
-
Microsoft Windows 11 23h2 Fixed in Version 10.0.22631.5335
-
Microsoft Windows 11 24h2 Fixed in Version 10.0.26100.4061
-
Microsoft Windows Server 2016 Fixed in Version 10.0.14393.8066
-
Microsoft Windows Server 2019 Fixed in Version 10.0.17763.7314
-
Microsoft Windows Server 2022 Fixed in Version 10.0.20348.3692
-
Microsoft Windows Server 2022 23h2 Fixed in Version 10.0.25398.1611
-
Microsoft Windows Server 2025 Fixed in Version 10.0.26100.4061
-
Microsoft Windows 10 1507 Fixed in Version 10.0.10240.21014