A newly recorded Windows kernel vulnerability, tracked as CVE-2025-55696, is a time‑of‑check/time‑of‑use (TOCTOU) race in the NtQueryInformationToken implementation (ntifs.h) that can allow a local attacker to elevate privileges to SYSTEM when exploited; Microsoft has published the entry in its...
Microsoft has recorded an elevation-of-privilege vulnerability in the Windows Cloud Files Mini Filter Driver (cldflt.sys) that permits a local actor to obtain sensitive kernel-level information and, in some attack chains, progress to SYSTEM privileges—an urgent issue for shared desktops, VDI...
Microsoft’s advisory for CVE-2025-50152 documents an out‑of‑bounds read in the Windows kernel that may allow an authorized local attacker to elevate privileges to SYSTEM; independent vulnerability trackers list the flaw with a CVSS v3.1 base score of 7.8 (High) and, until vendor KB mappings are...
Microsoft has recorded CVE-2025-55683 as a Windows Kernel information‑disclosure vulnerability and released security updates; administrators should treat this as a priority patch for any hosts that allow untrusted local code or multi‑user access. Background / Overview
Microsoft’s public entry...
Microsoft has published an advisory and a security update for CVE-2025-55679, a Windows Kernel information‑disclosure vulnerability that permits a local actor to obtain sensitive system memory under certain conditions — and administrators should treat it as a high-priority remediation for...
Microsoft’s SharePoint on‑premises ecosystem is at the center of a high‑urgency security crisis: a cluster of remote code execution (RCE) and authentication‑bypass issues — widely tracked under CVE identifiers such as CVE‑2025‑49704, CVE‑2025‑49706 and the emergent “ToolShell” chain...
Microsoft’s security advisory confirms a use‑after‑free defect in the BitLocker stack that can be triggered by an authorized local user to escalate privileges on affected Windows systems — administrators must treat CVE‑2025‑54912 as an urgent patching priority and assume a high‑impact threat...
Microsoft’s security update guide lists CVE‑2025‑54911 as a use‑after‑free defect in Windows BitLocker that can be triggered by an authorized local user to elevate privileges on affected machines, creating a high‑impact local elevation‑of‑privilege risk that administrators must treat as urgent...
Microsoft has published an advisory for CVE-2025-54105 — a local elevation-of-privilege vulnerability in the Microsoft Brokering File System (BFS) caused by a concurrency bug (race condition) that can be exploited by an authenticated local user to gain elevated rights on the host. Background
The...
CVE-2025-55226 is a locally exploitable race‑condition vulnerability in the Windows Graphics Kernel that allows an authenticated (local) attacker to achieve code execution in kernel context by inducing concurrent access to a shared graphics subsystem resource without proper synchronization. This...
Microsoft’s security portal lists CVE-2025-55228 as a Windows Graphics Component issue in the Win32K — GRFX code path that can be abused by an authenticated local actor through a concurrency/race condition; the flaw is described as allowing execution of attacker-supplied code in kernel context...
Microsoft has published an advisory for CVE-2025-54110, a Windows Kernel vulnerability caused by an integer overflow or wraparound that can be triggered by a locally authorized attacker to achieve elevation of privilege to SYSTEM on affected machines; administrators should treat this as a...
Microsoft’s advisory identifies a vulnerability in the Windows Ancillary Function Driver for WinSock (afd.sys) that can be triggered locally to escalate privileges — described on the vendor page as a buffer overflow in the WinSock ancillary driver — and administrators must treat this as a...
Microsoft’s security update guide lists a high‑risk elevation‑of‑privilege entry for the Windows MBT Transport driver that, according to the vendor advisory, stems from an untrusted pointer dereference and can be used by an authorized local user to escalate to SYSTEM — a kernel‑level impact that...
Windows Security is a strong baseline for protecting Windows 11 devices, but it was never designed to be a human-proof, one-stop solution — there are modern threats that built-in tools cannot fully mitigate, and relying on default protection alone leaves significant gaps in phishing...
Microsoft has published an advisory for CVE-2025-53723: a numeric truncation error in Windows Hyper‑V that Microsoft classifies as an Elevation of Privilege (EoP) vulnerability; the vendor states an authorized local attacker can exploit the flaw to escalate privileges on affected hosts...
Microsoft’s Security Update Guide entry for CVE-2025-53718 describes a use‑after‑free (UAF) flaw in the Windows Ancillary Function Driver for WinSock (AFD.sys) that can be triggered by a locally authorized user to obtain elevated privileges on affected Windows hosts — a kernel‑level...
Microsoft’s Security Response Guide flags a null-pointer dereference in the Windows Ancillary Function Driver for WinSock (AFD.sys) that, when reached by a local, authorized user, can be weaponized into an elevation‑of‑privilege to SYSTEM — a high‑impact kernel vulnerability that demands...
Microsoft has released patches for a kernel-mode flaw in the Kernel Streaming WOW Thunk Service Driver—an exploitable heap-based buffer overflow that can allow a locally authorized attacker to escalate privileges to SYSTEM—though the CVE identifier you supplied (CVE-2025-53149) does not appear...
A use‑after‑free vulnerability in the Windows Ancillary Function Driver for WinSock (AFD.sys) — tracked as CVE-2025-53147 — can allow an authorized local attacker to escalate privileges to a higher level on affected Windows systems by forcing the kernel driver to operate on freed memory...