CVE-2025-24995
📋 TL;DR
CVE-2025-24995 is a heap-based buffer overflow vulnerability in the Kernel Streaming WOW Thunk Service Driver that allows authenticated attackers to execute arbitrary code with elevated SYSTEM privileges. This affects Windows systems where an attacker already has local access. The vulnerability enables privilege escalation from a lower-privileged user account to full system control.
💻 Affected Systems
- Windows Kernel Streaming WOW Thunk Service Driver
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and data destruction.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install additional malware, and maintain persistence on compromised systems.
If Mitigated
Limited impact if proper patch management and least privilege principles are enforced, with attackers unable to gain initial access or execute code.
🎯 Exploit Status
Requires local authenticated access and knowledge of driver internals. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft's monthly security updates for specific KB numbers
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24995
Restart Required: Yes
Instructions:
1. Apply the latest Windows security updates from Microsoft. 2. Use Windows Update or WSUS to deploy patches. 3. Restart affected systems to complete installation.
🔧 Temporary Workarounds
Disable vulnerable driver
WindowsDisable or remove the Kernel Streaming WOW Thunk Service Driver if not required
sc stop ks
sc config ks start= disabled
🧯 If You Can't Patch
- Implement strict least privilege principles to limit initial access
- Monitor for suspicious driver loading and privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check system for presence of vulnerable driver version using driver query tools or PowerShell
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify Windows Update history contains the relevant security update and driver version is updated
📡 Detection & Monitoring
Log Indicators:
- Event ID 4697: Service installation
- Suspicious driver loading events
- Privilege escalation attempts
Network Indicators:
- None - local exploitation only
SIEM Query:
EventID=4697 AND (ServiceName="ks" OR ServiceName contains "Kernel Streaming")