
""An attacker with low-privilege local access can run a specially crafted application that repeatedly attempts to trigger this race condition," he explained. "The goal is to get multiple threads to interact with a shared kernel resource in an unsynchronised way, confusing the kernel's memory management and causing it to free the same memory block twice. "This successful double-free corrupts the kernel heap, allowing the attacker to overwrite memory and hijack the system's execution flow.""
""Organisations must prioritise applying the patch for this vulnerability. While a 7.0 CVSS score might not always top a patch list, the active exploitation status makes it a critical priority. A successful exploit grants the attacker System privileges, allowing them to completely bypass endpoint security, steal credentials, install rootkits, and perform other malicious actions. This is a critical link in an attacker's post-exploitation playbook.""
Microsoft released a lighter Patch Tuesday addressing 63 CVEs and one zero-day, CVE-2025-62215, an elevation-of-privilege flaw in the Windows Kernel with a CVSS score of 7.0. Exploitation of the zero-day has been observed in the wild despite no public proof-of-concept. The vulnerability arises from a race condition combined with a double-free memory management error. A low-privilege local attacker can run a crafted application to trigger unsynchronised kernel interactions, causing a double-free that corrupts the kernel heap, enabling memory overwrite and control-flow hijack. A successful exploit grants System privileges and enables credential theft, rootkits, and endpoint security bypass, making patching urgent.
Read at ComputerWeekly.com
Unable to calculate read time
Collection
[
|
...
]