Elevated Privilege Exposure in Windows Hyper-V by Microsoft
CVE-2025-21333

7.8HIGH

Key Information:

Badges

๐Ÿฅ‡ Trended No. 1๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 5,090๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐Ÿฆ… CISA Reported

What is CVE-2025-21333?

CVE-2025-21333 is a vulnerability found in Microsoftโ€™s Windows Hyper-V, which is a virtualization platform that allows users to create and manage virtual machines. This specific vulnerability resides in the integration components of the Hyper-V NT Kernel, potentially allowing an attacker to elevate their privileges. If exploited, this could enable unauthorized users to gain elevated access to the host operating system, which could significantly compromise the security of the entire virtualized environment within an organization.

Technical Details

This vulnerability is due to improper handling of specific integration scenarios within the Hyper-V environment. Attackers with certain access privileges could exploit this oversight to execute code with higher permissions than intended. This exploitation does not require the attacker to authenticate, increasing the risk of unauthorized exploitation within environments relying on Hyper-V for application hosting or development.

Potential Impact of CVE-2025-21333

  1. Unauthorized Access: The primary concern is that attackers could gain elevated privileges, allowing them to access sensitive data and resources on the host machine, which could lead to unauthorized actions such as data theft or system manipulation.

  2. Host Compromise: By exploiting this vulnerability, an attacker can potentially compromise not just the individual virtual machine but the entire host system, thereby affecting all contained virtual machines and their applications.

  3. Increased Attack Surface: The existence of this vulnerability can expose organizations to a higher risk of further attacks, as it may serve as a foothold for malicious actors. If they can escalate their privilege within the system, they could install additional malware, propagate through the network, or launch attacks against other systems.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Windows 10 Version 21H2 x64-based Systems 10.0.19043.0 < 10.0.19044.5371

Windows 10 Version 22H2 x64-based Systems 10.0.19045.0 < 10.0.19045.5371

Windows 11 version 22H2 ARM64-based Systems 10.0.22621.0 < 10.0.22621.4751

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿฅ‡

    Vulnerability reached the number 1 worldwide trending spot

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿฆ…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.