kernel vulnerability

  1. CVE-2025-59192: Urgent Patch for Windows Storport Buffer Over-Read

    Microsoft has added CVE-2025-59192 to its October security rollup: a buffer over‑read in the Storport.sys Windows storage driver that Microsoft says can be abused by a locally authorized attacker to gain elevated privileges, and administrators should treat the published update as an urgent...
  2. CVE-2025-55696: Windows Kernel TOCTOU Token Race Privilege Escalation

    A newly recorded Windows kernel vulnerability, tracked as CVE-2025-55696, is a time‑of‑check/time‑of‑use (TOCTOU) race in the NtQueryInformationToken implementation (ntifs.h) that can allow a local attacker to elevate privileges to SYSTEM when exploited; Microsoft has published the entry in its...
  3. CVE-2025-55680 Patch Cloud Files Mini Filter Driver Privilege Elevation

    Microsoft has recorded an elevation-of-privilege vulnerability in the Windows Cloud Files Mini Filter Driver (cldflt.sys) that permits a local actor to obtain sensitive kernel-level information and, in some attack chains, progress to SYSTEM privileges—an urgent issue for shared desktops, VDI...
  4. CVE-2025-50152: Windows Kernel Out-of-Bounds Read and Local Privilege Escalation

    Microsoft’s advisory for CVE-2025-50152 documents an out‑of‑bounds read in the Windows kernel that may allow an authorized local attacker to elevate privileges to SYSTEM; independent vulnerability trackers list the flaw with a CVSS v3.1 base score of 7.8 (High) and, until vendor KB mappings are...
  5. CVE-2025-55683 Patch: Windows Kernel Info Disclosure Targets Multi User Systems

    Microsoft has recorded CVE-2025-55683 as a Windows Kernel information‑disclosure vulnerability and released security updates; administrators should treat this as a priority patch for any hosts that allow untrusted local code or multi‑user access. Background / Overview Microsoft’s public entry...
  6. Patch CVE-2025-55679: Windows Kernel Local Info Disclosure (High Priority)

    Microsoft has published an advisory and a security update for CVE-2025-55679, a Windows Kernel information‑disclosure vulnerability that permits a local actor to obtain sensitive system memory under certain conditions — and administrators should treat it as a high-priority remediation for...
  7. SharePoint On-Prem RCE Crisis: Patch Rotate Keys Hunt Web Shells

    Microsoft’s SharePoint on‑premises ecosystem is at the center of a high‑urgency security crisis: a cluster of remote code execution (RCE) and authentication‑bypass issues — widely tracked under CVE identifiers such as CVE‑2025‑49704, CVE‑2025‑49706 and the emergent “ToolShell” chain...
  8. Urgent Patch Required: CVE-2025-54912 BitLocker Kernel UAF Privilege Escalation

    Microsoft’s security advisory confirms a use‑after‑free defect in the BitLocker stack that can be triggered by an authorized local user to escalate privileges on affected Windows systems — administrators must treat CVE‑2025‑54912 as an urgent patching priority and assume a high‑impact threat...
  9. CVE-2025-54911: High-Impact BitLocker Local Privilege Escalation (UAF)

    Microsoft’s security update guide lists CVE‑2025‑54911 as a use‑after‑free defect in Windows BitLocker that can be triggered by an authorized local user to elevate privileges on affected machines, creating a high‑impact local elevation‑of‑privilege risk that administrators must treat as urgent...
  10. CVE-2025-54105: Local Elevation of Privilege in Microsoft BFS (Brokering File System)

    Microsoft has published an advisory for CVE-2025-54105 — a local elevation-of-privilege vulnerability in the Microsoft Brokering File System (BFS) caused by a concurrency bug (race condition) that can be exploited by an authenticated local user to gain elevated rights on the host. Background The...
  11. CVE-2025-55226: Local kernel code execution via Windows Graphics Kernel race condition

    CVE-2025-55226 is a locally exploitable race‑condition vulnerability in the Windows Graphics Kernel that allows an authenticated (local) attacker to achieve code execution in kernel context by inducing concurrent access to a shared graphics subsystem resource without proper synchronization. This...
  12. CVE-2025-55228: Windows GRFX Race Condition and Patch Guidance

    Microsoft’s security portal lists CVE-2025-55228 as a Windows Graphics Component issue in the Win32K — GRFX code path that can be abused by an authenticated local actor through a concurrency/race condition; the flaw is described as allowing execution of attacker-supplied code in kernel context...
  13. CVE-2025-54110: Urgent Windows Kernel Patch & Mitigations

    Microsoft has published an advisory for CVE-2025-54110, a Windows Kernel vulnerability caused by an integer overflow or wraparound that can be triggered by a locally authorized attacker to achieve elevation of privilege to SYSTEM on affected machines; administrators should treat this as a...
  14. CVE-2025-54099: Windows AFD.sys Stack Overflow Privilege Escalation Explained

    Microsoft’s advisory identifies a vulnerability in the Windows Ancillary Function Driver for WinSock (afd.sys) that can be triggered locally to escalate privileges — described on the vendor page as a buffer overflow in the WinSock ancillary driver — and administrators must treat this as a...
  15. MBT Transport Driver (netbt.sys) Local EoP: Patch, Mitigation & Detection

    Microsoft’s security update guide lists a high‑risk elevation‑of‑privilege entry for the Windows MBT Transport driver that, according to the vendor advisory, stems from an untrusted pointer dereference and can be used by an authorized local user to escalate to SYSTEM — a kernel‑level impact that...
  16. Beyond Windows Security: Strengthen Windows 11 with MFA, Patching & Phishing

    Windows Security is a strong baseline for protecting Windows 11 devices, but it was never designed to be a human-proof, one-stop solution — there are modern threats that built-in tools cannot fully mitigate, and relying on default protection alone leaves significant gaps in phishing...
  17. CVE-2025-53723: Numeric Truncation in Hyper-V Elevates Privilege

    Microsoft has published an advisory for CVE-2025-53723: a numeric truncation error in Windows Hyper‑V that Microsoft classifies as an Elevation of Privilege (EoP) vulnerability; the vendor states an authorized local attacker can exploit the flaw to escalate privileges on affected hosts...
  18. CVE-2025-53718: Windows AFD.sys UAF Privilege Escalation — Patch, Detect, Harden

    Microsoft’s Security Update Guide entry for CVE-2025-53718 describes a use‑after‑free (UAF) flaw in the Windows Ancillary Function Driver for WinSock (AFD.sys) that can be triggered by a locally authorized user to obtain elevated privileges on affected Windows hosts — a kernel‑level...
  19. AFD.sys Null Pointer Dereference: Local EoP to SYSTEM - Patch Now

    Microsoft’s Security Response Guide flags a null-pointer dereference in the Windows Ancillary Function Driver for WinSock (AFD.sys) that, when reached by a local, authorized user, can be weaponized into an elevation‑of‑privilege to SYSTEM — a high‑impact kernel vulnerability that demands...
  20. Patch Windows Kernel Streaming WOW Thunk (ks.sys) LPE: Heap Overflow Risk

    Microsoft has released patches for a kernel-mode flaw in the Kernel Streaming WOW Thunk Service Driver—an exploitable heap-based buffer overflow that can allow a locally authorized attacker to escalate privileges to SYSTEM—though the CVE identifier you supplied (CVE-2025-53149) does not appear...