Dec 2025: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62221 Published on December 9, 2025
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
Known Exploited Vulnerability
This Microsoft Windows Use After Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.
The following remediation steps are recommended / required by December 30, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-62221 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2025-62221
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1809:- Version 10.0.17763.0 and below 10.0.17763.8146 is affected.
- Version 10.0.19044.0 and below 10.0.19044.6691 is affected.
- Version 10.0.19045.0 and below 10.0.19045.6691 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6345 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6345 is affected.
- Version 10.0.26100.0 and below 10.0.26100.7462 is affected.
- Version 10.0.26200.0 and below 10.0.26200.7462 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8146 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8146 is affected.
- Version 10.0.20348.0 and below 10.0.20348.4529 is affected.
- Version 10.0.25398.0 and below 10.0.25398.2025 is affected.
- Version 10.0.26100.0 and below 10.0.26100.7462 is affected.
- Version 10.0.26100.0 and below 10.0.26100.7462 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.