Aug 2025: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-53141 Published on August 12, 2025
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Weakness Type
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
Products Associated with CVE-2025-53141
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1507:- Version 10.0.10240.0 and below 10.0.10240.21100 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8330 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7678 is affected.
- Version 10.0.19044.0 and below 10.0.19044.6216 is affected.
- Version 10.0.19045.0 and below 10.0.19045.6216 is affected.
- Version 10.0.22621.0 and below 10.0.22621.5768 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5768 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5768 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4946 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27872 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27872 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23471 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23471 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25622 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25622 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22725 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22725 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8330 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8330 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7678 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7678 is affected.
- Version 10.0.20348.0 and below 10.0.20348.4052 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1791 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4946 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4946 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.