CVE-2025-60707

7.8 HIGH

📋 TL;DR

CVE-2025-60707 is a use-after-free vulnerability in Windows Multimedia Class Scheduler Service (MMCSS) that allows authenticated attackers to execute arbitrary code with elevated SYSTEM privileges. This affects Windows systems where an attacker has initial access with standard user permissions. The vulnerability enables local privilege escalation from a lower-privileged account to full system control.

💻 Affected Systems

Products:
  • Windows Multimedia Class Scheduler Service (MMCSS)
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default Windows installations where MMCSS service is running. The service runs with SYSTEM privileges by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains SYSTEM privileges, installs persistent malware, accesses all data, and potentially moves laterally across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional tools, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation prevent initial access and lateral movement.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated access to the target system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (through phishing, credential theft, etc.), they can exploit this to gain full control and potentially move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access but is relatively straightforward to execute once initial access is obtained. Public detection and mitigation scripts exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Microsoft security updates released in March 2025

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60707

Restart Required: Yes

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Restart affected systems. 3. Verify the patch is installed via Windows Update history or system information.

🔧 Temporary Workarounds

Disable MMCSS Service

windows

Temporarily disable the Multimedia Class Scheduler Service to prevent exploitation

sc config Audiosrv start= disabled
sc stop Audiosrv

Restrict Service Permissions

windows

Modify service permissions to prevent unauthorized access

sc sdset Audiosrv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

🧯 If You Can't Patch

  • Implement strict endpoint detection and response (EDR) to detect privilege escalation attempts
  • Enforce least privilege principles and restrict standard user permissions to limit initial access

🔍 How to Verify

Check if Vulnerable:

Check if the March 2025 security updates are not installed. Review Windows Update history for KB5035853 or later security updates.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify the security update is installed via: wmic qfe list | findstr KB5035853

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from MMCSS-related services
  • Privilege escalation attempts in Windows Security logs (Event ID 4688)
  • Suspicious service manipulation events

Network Indicators:

  • Lateral movement following local privilege escalation
  • Unusual outbound connections from previously compromised systems

SIEM Query:

EventID=4688 AND (NewProcessName="*cmd.exe" OR NewProcessName="*powershell.exe") AND SubjectUserName="SYSTEM" AND ParentProcessName="*mmcss*"

🔗 References

📤 Share & Export