CVE-2025-21334
📋 TL;DR
This vulnerability allows an authenticated attacker with local access to a Windows Hyper-V host to escalate privileges by exploiting a use-after-free bug in the Virtualization Service Provider (VSP) component. Successful exploitation could lead to arbitrary code execution with SYSTEM privileges on the host. This affects Windows systems running Hyper-V with the vulnerable VSP component.
💻 Affected Systems
- Windows Hyper-V
📦 What is this software?
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
Windows 11 24h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full SYSTEM-level control over the Hyper-V host, potentially compromising all guest VMs and host resources, leading to complete system takeover and data exfiltration.
Likely Case
Privileged attacker (e.g., local admin) escalates to SYSTEM to bypass security controls, install malware, or pivot to other systems in the environment.
If Mitigated
With proper network segmentation and least privilege, impact is limited to the compromised host; guest VMs remain isolated if Hyper-V security features are properly configured.
🎯 Exploit Status
Exploitation requires local access and understanding of Hyper-V internals; CISA indicates it's known to be exploited, suggesting active use in attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft's monthly security updates for specific KB numbers; apply latest cumulative updates.
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334
Restart Required: Yes
Instructions:
1. Apply the latest Windows security update from Microsoft. 2. Restart the Hyper-V host to complete installation. 3. Verify the patch is applied using Windows Update history or systeminfo command.
🔧 Temporary Workarounds
Disable Hyper-V if not required
WindowsRemoves the vulnerable component by disabling the Hyper-V role, but this will stop all virtual machines.
Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All
🧯 If You Can't Patch
- Restrict local access to Hyper-V hosts using strict authentication and network segmentation.
- Monitor for unusual process activity or privilege escalation attempts on Hyper-V hosts using EDR tools.
🔍 How to Verify
Check if Vulnerable:
Check if Hyper-V is enabled and the system is unpatched; use 'systeminfo' to see OS build and compare with patched versions.
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify Windows Update history for the relevant KB patch or use 'Get-HotFix' in PowerShell to confirm installation.
📡 Detection & Monitoring
Log Indicators:
- Event ID 4688 (process creation) with unusual parent processes, especially from Hyper-V components
- Security log events showing privilege escalation
Network Indicators:
- Unusual outbound connections from Hyper-V hosts to command-and-control servers
SIEM Query:
EventID=4688 AND (ProcessName="*vsp*" OR ParentProcessName="*vsp*") | stats count by host