CVE-2025-24076

7.3 HIGH

📋 TL;DR

This vulnerability in Windows Cross Device Service allows an authenticated attacker to escalate privileges on a local system. It affects Windows devices where the service is enabled, potentially allowing attackers to gain higher-level access than intended.

💻 Affected Systems

Products:
  • Windows Cross Device Service
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows 10, Windows 11, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Cross Device Service to be enabled and running. Check Microsoft advisory for exact affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with initial access could gain SYSTEM privileges, potentially compromising the entire system and accessing sensitive data or installing persistent malware.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install software, or access restricted resources on compromised systems.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the compromised user account's permissions.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system, they can exploit this to elevate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the system. Exploitation involves manipulating the Cross Device Service's access controls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft's monthly security updates for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24076

Restart Required: No

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Ensure Windows Update is configured to automatically install security patches. 3. Verify the patch is applied by checking system updates.

🔧 Temporary Workarounds

Disable Cross Device Service

Windows

Temporarily disable the vulnerable service if not needed

sc stop cbdhsvc
sc config cbdhsvc start= disabled

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all user accounts
  • Monitor for suspicious privilege escalation attempts and service manipulation

🔍 How to Verify

Check if Vulnerable:

Check if the Cross Device Service is running and if the system has unpatched Windows security updates

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify the latest Windows security updates are installed and the system is no longer listed as vulnerable in Microsoft's advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Cross Device Service activity
  • Privilege escalation attempts
  • Service manipulation events in Windows Event Logs

Network Indicators:

  • Unusual local system calls or service communications

SIEM Query:

EventID=4688 AND ProcessName LIKE '%cbdhsvc%' OR EventID=4672 AND SubjectUserName NOT IN (expected_admin_users)

🔗 References

📤 Share & Export