CVE-2025-24072
📋 TL;DR
CVE-2025-24072 is a use-after-free vulnerability in Microsoft's Local Security Authority Server (lsasrv) that allows authenticated attackers to elevate privileges locally. This affects Windows systems where an attacker with valid credentials can exploit the flaw to gain SYSTEM-level access. The vulnerability requires local access and authentication to exploit.
💻 Affected Systems
- Microsoft Windows
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
Windows 11 24h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker gains SYSTEM privileges, enabling complete system compromise, credential theft, persistence establishment, and lateral movement across the network.
Likely Case
An authenticated user with standard privileges escalates to SYSTEM to install malware, disable security controls, or access sensitive data on the compromised system.
If Mitigated
With proper privilege separation and endpoint protection, exploitation may be detected and blocked, limiting damage to the initial system.
🎯 Exploit Status
Requires authenticated access and understanding of Windows security subsystem internals. No public exploit code available at disclosure.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: To be determined from Microsoft's monthly security updates
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24072
Restart Required: No
Instructions:
1. Check Microsoft's security update guide for CVE-2025-24072. 2. Apply the corresponding Windows security update through Windows Update or WSUS. 3. Verify the update installed successfully.
🔧 Temporary Workarounds
Restrict local administrative access
allLimit the number of users with local administrative privileges to reduce attack surface
🧯 If You Can't Patch
- Implement strict least privilege access controls and monitor for privilege escalation attempts
- Deploy endpoint detection and response (EDR) solutions configured to alert on lsass.exe anomalies
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for the specific KB number associated with CVE-2025-24072 or use Microsoft's security update guide
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify the security update is installed via 'Get-Hotfix' in PowerShell or check Windows Update history
📡 Detection & Monitoring
Log Indicators:
- Unusual lsass.exe process behavior in Windows Security logs
- Event ID 4688 showing unexpected process creation from lsass
- Privilege escalation attempts in security audit logs
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
source="WinEventLog:Security" (EventCode=4688 AND NewProcessName="*lsass.exe*") OR (EventCode=4672 AND PrivilegeList="SeDebugPrivilege")