CVE-2025-21372

7.8 HIGH

📋 TL;DR

This vulnerability in Microsoft Brokering File System allows attackers to escalate privileges on affected Windows systems. An authenticated attacker could exploit this to gain SYSTEM-level access, affecting Windows 10, 11, and Server versions with the vulnerable component.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2019
  • Windows Server 2022
Versions: All versions with the vulnerable Brokering File System component prior to the security update
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the Microsoft Brokering File System component enabled (default in most Windows installations).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, enabling complete control over the system, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access restricted resources on the compromised system.

🟢

If Mitigated

Limited impact if proper patch management and least privilege principles are enforced, though the vulnerability still presents risk until patched.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated access to the system.
🏢 Internal Only: HIGH - Significant risk for internal systems where attackers could gain initial access through phishing or other means and then escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and specific conditions to trigger the use-after-free vulnerability (CWE-416).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security Update for Windows released in February 2025

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372

Restart Required: Yes

Instructions:

1. Open Windows Update Settings. 2. Click 'Check for updates'. 3. Install all available security updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict local access

all

Limit user accounts with local access to systems, implement least privilege principles

Enable Windows Defender Exploit Guard

windows

Configure exploit protection to mitigate privilege escalation attempts

🧯 If You Can't Patch

  • Implement strict access controls and least privilege for all user accounts
  • Monitor for suspicious privilege escalation attempts using security tools

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for February 2025 security updates or run 'systeminfo' command and verify the OS build number is patched

Check Version:

wmic os get version,buildnumber,caption

Verify Fix Applied:

Verify the security update KB number from February 2025 is installed via Windows Update history

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with suspicious process creation
  • Security log entries showing privilege escalation attempts
  • Brokering File System related errors in System logs

Network Indicators:

  • Unusual outbound connections following local privilege escalation

SIEM Query:

EventID=4688 AND (NewProcessName="*cmd.exe" OR NewProcessName="*powershell.exe") AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1938"

🔗 References

📤 Share & Export