AI description
CVE-2025-53149 is a heap-based buffer overflow vulnerability found in the Kernel Streaming WOW Thunk Service Driver. An authorized attacker with local access could exploit this vulnerability to elevate their privileges. The vulnerability exists in the Windows Kernel Streaming component (ks.sys) and the WOW thunking code paths. Exploitation involves sending crafted I/O control codes (IOCTLs) or malformed data to the driver. A patch has been made available by Microsoft.
- Description
- Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
- Source
- secure@microsoft.com
- NVD status
- Modified
- Products
- windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-122
- Hype score
- Not currently trending
***CVE-2025-53149*** Heap Overflow en ksthunk.sys → permite elevación de privilegios locales en Windows *Parche liberado: 12/08/2025 *No requiere interacción del usuario Detalles: •NVD: https://t.co/APBFF4lMtY •Tenable: https://t.co/CCfvOcpfDJ •CrowdFense:
@carlosthevargas
7 Sept 2025
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
به تازگی آسیب پذیری جدیدی با کد شناسایی CVE-2025-53149 از نوع Buffer Overflow برای سیستم عامل Windows منتشر شده است. این آسیب پذیری که دارای نمره 7.8 می باشد باعث ارتقای سطح د
@AmirHossein_sec
6 Sept 2025
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Windowsにおいて深刻な権限昇格脆弱性(CVE-2025-53149)が発見され、2025年8月の月例更新で修正された。問題はKernel Streaming WOW Thunk Service Driver非ページヒープベースのバッファオーバーフローである。
@yousukezan
5 Sept 2025
1366 Impressions
2 Retweets
6 Likes
0 Bookmarks
0 Replies
0 Quotes
An Analysis of Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver - CVE-2025-53149 https://t.co/dLpRIrIg2F https://t.co/7BQ4QpFxj1
@secharvesterx
5 Sept 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Technical deep-dive into CVE-2025-53149, a heap-based buffer overflow in the Windows Kernel Streaming WOW Thunk Service driver (ksthunk.sys). https://t.co/KJ08k0EHKm
@crowdfense
4 Sept 2025
16223 Impressions
32 Retweets
104 Likes
62 Bookmarks
1 Reply
2 Quotes
CVE-2025-53149 Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally. https://t.co/bCHctrUG4D
@CVEnew
12 Aug 2025
174 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "29F441C0-F0F8-463F-B141-6A33EBA06B1D",
"versionEndExcluding": "10.0.10240.21100"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "5C7C5886-496D-4CBA-956A-A097AC7535D4",
"versionEndExcluding": "10.0.10240.21100"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "4E2D87DA-8EFF-4BB0-B025-A13C3F523BD1",
"versionEndExcluding": "10.0.14393.8330"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "C28DF998-E700-4675-9737-40A53288F54C",
"versionEndExcluding": "10.0.14393.8330"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "3A513AB8-ED03-4BCF-8077-09A117254263",
"versionEndExcluding": "10.0.17763.7678"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "47A8837D-AB4B-465B-8D1C-B89B4EDDBDD4",
"versionEndExcluding": "10.0.17763.7678"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "77A19D12-C137-4E01-AF99-E1E7BBC9F0C3",
"versionEndExcluding": "10.0.19044.6216"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "44D27317-F93F-418E-8EC6-9BD1256677C9",
"versionEndExcluding": "10.0.19045.6216"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B07546D0-ED2A-4B93-83E7-EA808DC39724",
"versionEndExcluding": "10.0.22621.5768"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "49E4DFC9-7EB4-4577-83C0-D1E94C2A8D97",
"versionEndExcluding": "10.0.22631.5768"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6376F067-CC36-4A7B-914B-0A60EFF1AC48",
"versionEndExcluding": "10.0.26100.4851"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CD31CC61-6C1C-4232-87D7-E5B4FEBB1276",
"versionEndExcluding": "10.0.14393.8330"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D224ABEA-CCE3-4D7D-86B5-5BEDBF83303B",
"versionEndExcluding": "10.0.17763.7678"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F752199D-6C01-4D8E-BD6C-3031E5CAED20",
"versionEndExcluding": "10.0.20348.3989"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "94E45649-92F4-4D4C-9D94-275506530222",
"versionEndExcluding": "10.0.25398.1791"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B75BE97E-C12D-4DFB-B5F2-B8BF90C3E64E",
"versionEndExcluding": "10.0.26100.4851"
}
],
"operator": "OR"
}
]
}
]