Windows Kernel 0-Day Vulnerability Actively Exploited in the Wild to Escalate Privileges

Microsoft has assigned CVE-2025-62215 to a new Windows Kernel elevation-of-privilege flaw that is being actively exploited in the wild.

Published on November 11, 2025, the vulnerability is rated Important and is tracked as an elevation-of-privilege issue in the kernel.

Microsoft’s exploitability index lists “Exploitation Detected,” indicating real-world use despite the absence of public disclosure.​

CVE-2025-62215 stems from concurrent execution of code that uses a shared resource without proper synchronization, a classic race condition vulnerability aligned with CWE-362.

The flaw also involves improper memory management, creating a double-free scenario that allows attackers to escalate privileges when successfully exploited.

Successful exploitation requires an attacker to win a race condition, making the CVSS Attack Complexity rating High.

However, when the timing aligns correctly, the vulnerability grants the attacker SYSTEM-level privileges.

The flaw is local and requires an already authorized attacker, making it a classic post-compromise privilege escalation used to deepen control, disable defenses, and move laterally through networks.

While the technical specifics remain limited, the combination of a race condition and a double free suggests a timing-sensitive memory corruption path in kernel code.

This profile is consistent with techniques favored by both targeted threat actors and ransomware operators to elevate privileges after initial access via phishing, driver abuse, or application exploits.

Microsoft notes that exploitation is more likely due to its active use in the wild, potentially allowing threat actors to gain higher access on affected Windows systems.

No workaround exists beyond installing the update, and security experts recommend immediate deployment on all supported versions.

Windows VersionAffectedFixed KB NumberRelease DateNotes
Windows 10 (various builds, including ESU)YesKB5068858November 12, 2025All supported editions affected; ESU required for post-support patching.
Windows 11 version 22H2YesKB5068865November 12, 2025Core kernel component; immediate patching recommended.
Windows 11 version 23H2YesKB5068862November 12, 2025Includes security and quality fixes addressing the race condition.
Windows 11 version 24H2YesKB5068861November 12, 2025Latest feature update; exploitation detected pre-patch.
Windows Server 2019YesKB5068859November 12, 2025Server environments at higher risk due to privilege escalation potential.
Windows Server 2022YesKB5068860November 12, 2025Applies to domain controllers and file servers; monitor for updates.
Windows Server 2025YesKB5068861November 12, 2025New server OS; aligns with Windows 11 24H2 patching.

Given that exploitation has been detected but no public proof-of-concept is available, expect continued targeted use.

Organizations should treat CVE-2025-62215 as a priority for rapid patching and detection engineering, with special attention to servers, jump hosts, and administrative workstations.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here