CVE-2025-24994

7.3 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker on a Windows system to exploit improper access control in the Cross Device Service to gain elevated local privileges. It affects Windows systems with the vulnerable service enabled. Attackers could potentially execute code with higher privileges than originally granted.

💻 Affected Systems

Products:
  • Windows Cross Device Service
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows 10, Windows 11, Windows Server 2016/2019/2022
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Windows Cross Device Service to be enabled and running. Some enterprise configurations may have this disabled by policy.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM-level privileges, enabling complete compromise of the local system, installation of persistent malware, credential theft, and lateral movement within the network.

🟠

Likely Case

An authenticated user with standard privileges escalates to administrator or SYSTEM privileges, allowing them to bypass security controls, install unauthorized software, or access protected resources.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to the specific user account, preventing lateral movement and system-wide compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal attackers with standard user access could exploit this to gain elevated privileges on workstations and servers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of the specific service manipulation technique. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24994

Restart Required: No

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Use Windows Update or WSUS to deploy patches. 3. Verify the patch is applied using Windows Update history.

🔧 Temporary Workarounds

Disable Windows Cross Device Service

Windows

Disables the vulnerable service to prevent exploitation

sc config cbdhsvc_* start= disabled
sc stop cbdhsvc_*

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit user permissions
  • Monitor for unusual service manipulation or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Windows Cross Device Service is running: sc query cbdhsvc_*

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history for the specific security update KB number

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with Cross Device Service process creation
  • Unexpected privilege escalation events in Security logs
  • Service manipulation attempts in System logs

Network Indicators:

  • No specific network indicators as this is local exploitation

SIEM Query:

EventID=4688 AND (NewProcessName="*cbdhsvc*" OR ParentProcessName="*cbdhsvc*")

🔗 References

📤 Share & Export