CVE-2025-24055
📋 TL;DR
An out-of-bounds read vulnerability in the Windows USB Video Driver allows an authorized attacker with physical access to read sensitive information from kernel memory. This affects Windows systems with USB video devices connected. The attacker must have physical access to the target system.
💻 Affected Systems
- Windows USB Video Driver
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
Windows 11 24h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
An attacker with physical access could read kernel memory containing sensitive information like passwords, encryption keys, or other system data, potentially leading to further system compromise.
Likely Case
Limited information disclosure from kernel memory, potentially revealing system state information but not full system compromise.
If Mitigated
With proper physical security controls, the risk is minimal as physical access is required for exploitation.
🎯 Exploit Status
Exploitation requires physical access and authorized access to the system. The attacker needs to interact with the USB video device driver.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft Security Update Guide for specific KB numbers
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24055
Restart Required: Yes
Instructions:
1. Open Windows Update settings
2. Check for updates
3. Install all available security updates
4. Restart the system when prompted
🔧 Temporary Workarounds
Disable USB video devices
windowsPrevent loading of vulnerable USB video driver by disabling USB video devices
Device Manager > Universal Serial Bus controllers > Right-click USB Video Device > Disable device
Restrict physical access
allImplement physical security controls to prevent unauthorized physical access to systems
🧯 If You Can't Patch
- Implement strict physical security controls and access monitoring
- Disconnect unnecessary USB video devices and disable the driver in Device Manager
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for the specific KB patch mentioned in Microsoft advisory
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify the security update is installed via Windows Update history or systeminfo command
📡 Detection & Monitoring
Log Indicators:
- USB device connection logs
- Driver loading events in System logs
- Unexpected USB video device access
Network Indicators:
- Not applicable - physical access required
SIEM Query:
EventID=6416 OR EventID=20001 OR DeviceClass='USBVideo' in Windows Event Logs