CVE-2025-60710

7.8 HIGH

📋 TL;DR

This vulnerability allows an authorized attacker to exploit improper link resolution in the Host Process for Windows Tasks to elevate privileges locally. It affects Windows systems where an attacker already has some level of access and can create symbolic links. The flaw enables local privilege escalation from a lower-privileged account to higher system privileges.

💻 Affected Systems

Products:
  • Windows Host Process for Windows Tasks
Versions: Specific Windows versions as detailed in Microsoft's advisory (check the MSRC link for exact versions)
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations of Windows where the Host Process for Windows Tasks is running. Systems with strict symbolic link policies or disabled task scheduling may have reduced exposure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains SYSTEM-level privileges, enabling installation of persistent malware, credential theft, and full control over the affected machine.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, access sensitive data, and move laterally within the network from a compromised user account.

🟢

If Mitigated

Limited impact with proper privilege separation, where attackers remain confined to their original privilege level and cannot escalate to administrative or SYSTEM privileges.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system; it cannot be exploited directly from the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a Windows system (through phishing, credential theft, etc.), this vulnerability allows them to escalate privileges and potentially compromise the entire network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to create symbolic links. Public detection and mitigation scripts exist, indicating active security community attention.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft's monthly security updates for the specific KB number addressing CVE-2025-60710

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710

Restart Required: Yes

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Ensure the update includes the KB for CVE-2025-60710. 3. Restart the system to complete the patch installation.

🔧 Temporary Workarounds

Restrict Symbolic Link Creation

windows

Limit which users can create symbolic links to reduce attack surface

Use Group Policy: Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment > Create symbolic links

Monitor Task Scheduler Activity

windows

Enable auditing and monitoring of task scheduler events for suspicious activity

auditpol /set /subcategory:"Other Object Access Events" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict privilege separation and least privilege principles to limit damage from successful exploitation
  • Deploy endpoint detection and response (EDR) solutions to detect and block privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if the system has the security patch installed via Windows Update history or by verifying the specific KB number is present

Check Version:

wmic qfe list | findstr KB[number] or Get-HotFix -Id KB[number] in PowerShell

Verify Fix Applied:

Verify the patch is installed and test that symbolic link attacks against the Host Process for Windows Tasks no longer succeed

📡 Detection & Monitoring

Log Indicators:

  • Unusual task scheduler events, creation of symbolic links by non-admin users, privilege escalation attempts in security logs

Network Indicators:

  • Lateral movement from compromised hosts, unusual outbound connections following local privilege escalation

SIEM Query:

EventID=4698 OR EventID=4702 (Scheduled Task Created/Updated) combined with suspicious user context or file paths

🔗 References

📤 Share & Export