CVE-2025-62215

Published Nov 11, 2025

Last updated 3 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-62215 is an elevation-of-privilege vulnerability affecting the Windows Kernel. It stems from a race condition due to improper synchronization when multiple processes concurrently access shared resources. An attacker with local access and some level of system access can exploit this flaw to execute code with elevated privileges, potentially gaining SYSTEM-level access. The vulnerability is triggered by exploiting a race condition in the Windows Kernel's memory management subsystem. By carefully timing multiple threads or processes, an attacker can manipulate shared kernel resources to cause a double-free condition, potentially leading to memory corruption. This allows the attacker to execute arbitrary code in the kernel's context.

Description
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.
Source
secure@microsoft.com
NVD status
Analyzed
Products
windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_23h2, windows_11_24h2, windows_11_25h2, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025

Risk scores

CVSS 3.1

Type
Secondary
Base score
7
Impact score
5.9
Exploitability score
1
Vector string
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Microsoft Windows Race Condition Vulnerability
Exploit added on
Nov 12, 2025
Exploit action due
Dec 3, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

secure@microsoft.com
CWE-362

Social media

Hype score
Not currently trending
  1. Microsoft tackles actively exploited Windows Kernel flaw (CVE-2025-62215) in latest patches. Keep your system secure. #CISO #CyberRiskManagement https://t.co/ybMBkdXHEp

    @breachwire_io

    26 Jan 2026

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. CVE-2025-62215. Windows kernel race. Actively exploited. KEV. Linux 2025: 5.5k+ kernel CVEs. First Rust kernel CVE. Also a race. Timing bugs are everywhere. If your security tool lives in kernel, it inherits them. After CrowdStrike — is kernel really where defense should sit?

    @AlexeiBelous

    5 Jan 2026

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. [1day1line] CVE-2025-62215: LPE Vulnerability in Windows Kernel Due to Race Condition and Double Free https://t.co/mJ8J1VzmxQ Hello, this is Libera. Today's One-Line Update covers an LPE vulnerability discovered in ntoskrnl.exe within the Windows Kernel. The vulnerability arises

    @hackyboiz

    27 Dec 2025

    3756 Impressions

    19 Retweets

    73 Likes

    26 Bookmarks

    0 Replies

    1 Quote

  4. Just wrote about the critical Windows Kernel EoP CVE-2025-62215 from November MSPT. Local attackers could gain SYSTEM via Race Condition & Double Free. Patch now ⚙️ Waiting for December MSPT today ⏳ #Microsoft #Windows ➡️ https://t.co/o0vgf6Q3PN https://t.co/V7k0Wy6

    @leonov_av

    9 Dec 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Microsoft’s actively exploited Windows kernel race condition CVE-2025-62215 is now in CISA’s KEV, enabling privilege escalation after initial compromise. NVD entry: https://t.co/sHdHKUV9uD

    @InfosecDotWatch

    3 Dec 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🚨 #AlertaSOC | CVE-2025-62215 Informamos de nuevas vulnerabilidades que afectan a sistemas Microsoft Windows. #AndalucíaCert Recomendamos revisar la alerta oficial y aplicar las medidas de mitigación indicadas. ℹ️ Más información: https://t.co/2EC110SHXG https://t.co/e

    @CentroCiberAND

    3 Dec 2025

    21 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. A serious flaw CVE-2025-62215 in the Windows Kernel is being actively exploited. It’s a local privilege escalation bug: attackers with limited access can gain SYSTEM-level control. Severity: High (CVSS 7.0) Impact: Full system compromise if exploited after initial foothold.

    @ZBounty18591

    2 Dec 2025

    52 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. 🔴 CRITICAL: KB5068787 patches 2 zero-days actively exploited in the wild 🛡️ CVE-2025-62215 — Windows Kernel privilege escalation 🛡️ CVE-2025-59287 — WSUS remote code execution (CVSS 9.8) ⏰ WSUS servers: Patch within 24-48 hours 📖 Full deployment guide + st

    @ctrlaltnod

    29 Nov 2025

    100 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/GAfgpM8y6o https://t.co/qvfVu6F1Gk

    @IT_Peurico

    24 Nov 2025

    32 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🚨 Alerta Rodbol – Vulnerabilidad Zero-Day en Windows Se ha detectado una vulnerabilidad de escalación de privilegios, identificada como CVE-2025-62215, en el kernel de Windows que ya está siendo explotada en condiciones reales. 🛡️ ¿Qué significa para tu infraestr

    @RODBOLCOL

    24 Nov 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. WSUS RCE CVE-2025-59287 is under active exploit, with ShadowPad riding via compromised update chains. Kernel LPE CVE-2025-62215 also patched. Patch WSUS and Windows, then maybe breathe. #infosec https://t.co/Bv04pu4qas

    @threatcluster

    23 Nov 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. After analyzing 92% of vulnerabilities from past week, CVE-2025-62215 has 31 articles published from different internet sources, no other cve has these many articles. More information here: https://t.co/SyyDujjO8C #vulnerability #CyberSecurity #ThreatIntel #CVE #SecurityAlert

    @stooee_

    22 Nov 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. #مايكروسوفت تصدر تحديثًا أمنيًا لـ Windows Kernel لسد ثغرة CVE-2025-62215 خطيرة تُستخدم لرفع صلاحيات محليًا عبر race condition. الرجاء التحديث فورًا. #أمن_معلومات #Windows11 #ثغرا

    @belarabinet

    22 Nov 2025

    64 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/TBkEIjnVI8 https://t.co/JnjGB0Eba8

    @valterpcjr

    19 Nov 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. One zero-day’s already being exploited. Over 60 bugs fixed. Microsoft’s November patch is not optional. CVE-2025-62215 can let attackers in the back door. SMBs: update every Windows device now. Don’t wait for the knock. https://t.co/hp128ej8qg #CyberSecurity #PatchNow

    @lowcountrycyber

    18 Nov 2025

    54 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. Microsoft's latest security updates patch over 60 vulnerabilities, including a zero-day (vulnerability (CVE-2025-62215)) and a critical flaw (CVE-2025-60274) in a core Windows graphic component, exposing systems to potential exploitation and remote code execution. Defenders

    @cybernewslive

    17 Nov 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/jrheULEVWo

    @endorans43027

    17 Nov 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Urgent Microsoft Update: Patch Windows 10, 11, Server Now https://t.co/FWb5550kjG #cve-2025-62215 #PrivilegeEscalation #WindowsKernel

    @wizconsults

    16 Nov 2025

    50 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. CVE-2025-62215 que pega o Microsoft Windows já foi corrigida, mas olha... race condition...timing chato... é tão difícil de explorar que deveria dar um prêmio pra quem conseguir usar!

    @hashtagsec

    16 Nov 2025

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. Microsoftが現在悪用されているWindows カーネ ルのゼロデイ (CVE-2025-62215) をパッチ適用しましたね。まだ更新していない場合はすぐに更新して再起動しましょう。

    @inoritodo

    15 Nov 2025

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. ⚡️The zero-day vulnerability that has been listed as exploited in Tuesday's update is CVE-2025-62215 (CVSS score: 7.0), a privilege escalation flaw in Windows Kernel. The Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) have been cred

    @AnonOzzyDude

    14 Nov 2025

    159 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. 11 Kasım 2025 Patch Tuesday ile Microsoft, Windows Kernel'de bir ayrıcalık yükseltme hatasını (CVE-2025-62215) giderdi. https://t.co/3O2lyDbTyM #microsoft #securityupdate #CyberSecurity https://t.co/Qg5IZuigXr

    @adminguide

    14 Nov 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 🚨 Microsoft Patch Tuesday corrige 63 falhas — e um zero-day ativo! A atualização de novembro traz correções para vulnerabilidades críticas no Windows, WSLg, componentes gráficos e no Kerberos. ⚠️ Destaques: CVE-2025-62215: falha de race condition no kernel, já ex

    @brainworkblog

    13 Nov 2025

    63 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  24. 1/2 🚨 Patch Tuesday (Nov 2025) highlights: 63 new CVEs, incl: • Windows Kernel EoP zero-day (CVE-2025-62215) • GDI+ RCE (9.8) • Outlook Preview Pane RCE • SQL Server EoP (remote, low-priv creds)

    @pinholedawn

    13 Nov 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/akalPghHim https://t.co/hR6SrV3loP

    @ggrubamn

    13 Nov 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/3NXORlseM2 https://t.co/exvYxjh6E4

    @ggrubamn

    13 Nov 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨 Heads-up: CVE-2025-62215 = Windows Kernel race-condition + double-free bug → local attacker (already inside) can get SYSTEM privileges. 🔧 Patch immediately. Monitor for post-compromise escalation.

    @bountyayush

    13 Nov 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Microsoft corrige una vulnerabilidad del kernel de Windows que estaba siendo explotada activamente. Lanzan una carga ligera de parches, corrigiendo más de 60 vulnerabilidades, incluida una falla del kernel de Windows (CVE-2025-62215). #ciberseguridad https://t.co/CBs0PIpiRN

    @EHCGroup

    13 Nov 2025

    72 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 🚨 Critical #Windows Kernel Vulnerability #CVE-2025-62215: Active Exploitation Detected https://t.co/mP3dK95TVQ

    @UndercodeNews

    13 Nov 2025

    27 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/TC99NylgUj https://t.co/kMxG5UUsSn

    @pcasano

    13 Nov 2025

    40 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  31. First Windows 10 post-support update is here. Microsoft calls CVE-2025-62215 the "highest risk" vulnerability. Businesses should buy extended support; home users should upgrade ASAP to avoid risks. #Windows10 #CyberSecurity https://t.co/M3XL3uaF61

    @GoodChoiceIT

    13 Nov 2025

    150 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🚨Upozorňujeme na aktivně zneužívanou zero-day zranitelnost v Microsoft Windows kernel, CVE-2025-62215. Tato zranitelnost vyplývá z problému poškození paměti, který pramení ze „souběžného provádění pomocí sdíleného zdroje s nesprávnou synchronizací („

    @GOVCERT_CZ

    13 Nov 2025

    1089 Impressions

    4 Retweets

    8 Likes

    1 Bookmark

    0 Replies

    1 Quote

  33. 🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/bhh62Ej6nu

    @Jack1111262

    13 Nov 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. CRITICAL PATCH: Microsoft fixes 63 flaws, including a Windows Kernel EoP zero-day (CVE-2025-62215) actively exploited in the wild. Patch immediately! More info in: https://t.co/ZKrqe7jBKc https://t.co/9i7Sm4tc8X

    @58Consulting

    12 Nov 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 米国サイバーセキュリティ・社会基盤安全保障庁(CISA)が既知の悪用された脆弱性カタログに以下を追加。 - WatchGuard FireboxのCVE-2025-9242 - Gladinet TriofoxのCVE-2025-12480 - WindowsのCVE-2025-62215 対処期限は何れも通常の12/3

    @__kokumoto

    12 Nov 2025

    1877 Impressions

    0 Retweets

    3 Likes

    5 Bookmarks

    1 Reply

    1 Quote

  36. パッチ火曜日: Microsoft が Windows カーネルの脆弱性 (CVE-2025-62215) を修正 Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215) #HelpNetSecurity (Nov 12) https://t.co/XTtrRPjfH4

    @foxbook

    12 Nov 2025

    337 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  37. 🚨 Microsoft's November Patch Tuesday is here, fixing a Windows Kernel zero-day (CVE-2025-62215) actively exploited for privilege escalation. A critical 9.8 CVSS GDI+ RCE flaw (CVE-2025-60724) also patched. Patch now! ⚠️ #PatchTuesday #CyberSecurity... 🔗 https://t.co/Gb

    @NetSecIO

    12 Nov 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. برای کرنل ویندوز ، آسیب پذیری جدیدی از نوع privilege escalation با کد شناسایی CVE-2025-62215 منتشر شده است. برای امن سازی به قسمت windows update مراجعه کرده و پچ جدید را نصب کنید.

    @EthicalSafe

    12 Nov 2025

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. Microsoft patches actively exploited Windows Kernel zero-day CVE-2025-62215. Immediate update recommended to prevent privilege escalation attacks. Link: https://t.co/x68iTNwe5I #Security #Patch #Windows #Kernel #CVE #Exploit #Update #Software #Vulnerability #Protection #Defense h

    @dailytechonx

    12 Nov 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. ACHTUNG!!! 🚨 1/ ⚠️ Microsoft stopft eine aktiv ausgenutzte Kernel-Lücke (CVE-2025-62215). Wer nicht patcht, riskiert Systemrechte für Angreifer. 🔐 ➡️ Update sofort einspielen (Windows 10/11 & Server) + Neustart. https://t.co/nY1TJ3Qk4b

    @derHugoKlartext

    12 Nov 2025

    87 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    2 Replies

    0 Quotes

  41. The latest Patch Tuesday updates are here, and active exploitation is confirmed for CVE-2025-62215. This is rated Important and should be prioritized for patching. Get the latest on all the other CVEs from the November update here: https://t.co/y1oqIPPD2p #PatchTuesday https://

    @fortraofficial

    12 Nov 2025

    98 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. 🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/abs1fzTJXP

    @Jonny1599843

    12 Nov 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. 🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/U3GyFQgUPw

    @Favor487515

    12 Nov 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. Cyber alert! Microsoft just patched over 60 vulnerabilities, including one actively exploited. CVE-2025-62215 allows local attackers to escalate privileges. Prioritize updates, especially for RCE bugs! How are you tackling security this month? #Ciberseguridad https://t.co/lCoWLYv

    @CyberDailyPost

    12 Nov 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. 🚨 Microsoft Patch Tuesday - 63 CVEs, Kernel Zero-Day Exploited Microsoft patched 63 vulnerabilities including CVE-2025-62215—an actively exploited Windows kernel elevation-of-privilege zero-day. What's notable: the kernel flaw was being used in the wild before today's pa

    @the_c_protocol

    12 Nov 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. 🔐🪟 SIGNALS WEEKLY: Keys. Gates. Windows. Actively exploited Win kernel EoP ✅ (CVE-2025-62215). Cisco RA-VPN bugs can reload unpatched edges. LANDFALL used Samsung’s image bug (CVE-2025-21042). Which breaks first in your shop? Read -> https://t.co/JrOdxeJL8a #Alph

    @alphahunt_io

    12 Nov 2025

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/UkUzm3whU5 https://t.co/oZ2QaDdQlK

    @Trej0Jass

    12 Nov 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. 🚨 مایکروسافت Patch Tuesday نوامبر ۲۰۲۵ منتشر کرد: 🔹 63 آسیب‌پذیری 🔹 یک Zero-Day فعال: CVE-2025-62215 🔹 سوءاستفاده از یک باگ هستهٔ ویندوز و گرفتن دسترسی سیستم 💣 فوری پچ

    @vulnerbyte

    12 Nov 2025

    53 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. 🚨 Microsoft’s Nov 2025 Patch Advisory is live! 90+ flaws fixed across Windows, Azure, SQL, SharePoint & more, incl. critical RCEs & an actively exploited Windows Kernel EoP (CVE-2025-62215). 🛡️ Patch now → stay resilient. https://t.co/w9ynaMN7sa #Cybersecurit

    @sequretek_sqtk

    12 Nov 2025

    58 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/8E6Oh5KFxs https://t.co/Y3nRKbl2pb

    @Art_Capella

    12 Nov 2025

    57 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations