Windows Kernel 0‑day Vulnerability Actively Exploited in the Wild to Escalate Privilege


Microsoft has assigned CVE-2025-62215 to a new Windows Kernel elevation of privilege flaw that is being actively exploited in the wild.

Published on November 11, 2025, the vulnerability is rated Important and tracked as an elevation of privilege issue in the kernel. Microsoft’s exploitability index lists “Exploitation Detected,” indicating real-world use despite the absence of public disclosure.

CVE-2025-62215 stems from concurrent execution using a shared resource with improper synchronization, aligning with CWE-362 (race condition), and is also associated with CWE-415 (double free).

Successful exploitation requires an attacker to win a race condition (CVSS Attack Complexity: High), but when it lands, it can grant SYSTEM privileges.

The flaw is local and requires an already authorized attacker, making it a classic post-compromise privilege escalation used to deepen control, disable defenses, and move laterally.

While technical specifics remain limited, the combination of race condition and double free suggests a timing-sensitive memory corruption path in kernel code.

google

This profile is consistent with techniques favored by both targeted threat actors and ransomware operators to elevate privileges after initial access via phishing, driver abuse, or application exploits.

Windows VersionAffectedFixed KB NumberRelease DateNotes
Windows 10 (various builds, including ESU)YesKB5068858 (example for 22H2)November 12, 2025All supported editions affected; ESU required for post-support patching.
Windows 11 version 22H2YesKB5068865November 12, 2025Core kernel component; immediate patching recommended.
Windows 11 version 23H2YesKB5068862November 12, 2025Includes security and quality fixes addressing the race condition.
Windows 11 version 24H2YesKB5068861November 12, 2025Latest feature update; exploitation detected pre-patch.
Windows Server 2019YesKB5068859November 12, 2025Server environments at higher risk due to privilege escalation potential.
Windows Server 2022YesKB5068860November 12, 2025Applies to domain controllers and file servers; monitor for updates.
Windows Server 2025YesKB5068861November 12, 2025New server OS; aligns with Windows 11 24H2 patching.

Given that exploitation has been detected but no public proof-of-concept is available, expect continued targeted use.

Organizations should treat CVE-2025-62215 as a priority for rapid patching and detection engineering, with special attention to servers, jump hosts, and administrative workstations.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link