Thursday, March 5, 2026

Critical Windows Kernel Zero-Day Being Exploited To Gain Elevated Privileges

Microsoft has issued an urgent patch for a zero-day vulnerability in the Windows Kernel that attackers are already exploiting to escalate privileges on compromised systems.

This flaw, tracked as CVE-2025-62215, poses a significant risk to organizations relying on unpatched Windows environments, allowing low-privileged users to gain full SYSTEM access through a sophisticated race condition exploit.

As part of the November 2025 Patch Tuesday, Microsoft addressed 63 vulnerabilities. However, this one stands out due to confirmed in-the-wild activity detected by the company’s security teams.​

Windows Kernel Elevation Of Privilege Vulnerability New

The vulnerability arises from improper synchronization in the Windows Kernel, where concurrent processes access shared resources without adequate controls, resulting in a race condition classified as CWE-362.

This issue, combined with a double-free error (CWE-415), enables attackers to corrupt kernel memory and hijack the execution flow for privilege escalation.

Local attackers with low privileges can exploit the flaw by running crafted applications that trigger timing-sensitive interactions between threads, potentially bypassing security boundaries such as User Account Control.

Microsoft rates this as “Important” with a CVSS v3.1 score of 7.0, reflecting high attack complexity due to the need to exploit the race condition, though functional exploits are available.

No user interaction is required beyond initial local access, making it a potent post-exploitation tool for malware or insider threats.

The flaw affects a broad range of Windows versions, including Windows 11 (23H2, 24H2, 25H2), Windows 10 (21H2, 22H2, 1809), and various Windows Server editions from 2019 to 2025.

Early indicators suggest exploitation by advanced persistent threats, though Microsoft hasn’t disclosed specific actors.

CVE-2025-62215 Security Vulnerability

CVE-2025-62215 was publicly disclosed on November 11, 2025, with no prior public details, confirming its status as a zero-day before patching.

Successful exploitation grants attackers SYSTEM-level privileges, allowing them to gain complete control over the host, including data exfiltration, lateral movement, or ransomware deployment.

Microsoft’s advisory emphasizes that while local access is needed, the vulnerability’s high impact on confidentiality, integrity, and availability (all scored High) warrants immediate remediation.

Patches are available via KB articles such as 5068861 for Windows 11 24H2 and 5068781 for Windows 10 22H2, updating builds to secure versions, such as 10.0.26100.7171.

Organizations using Server Core installations or ARM64 systems should verify compatibility, as hotpatching is available for some editions.

For unpatched systems, Microsoft recommends enabling advanced auditing and monitoring for suspicious kernel activity. Acknowledgements go to the Microsoft Threat Intelligence Center for rapid response.

In summary, this kernel flaw underscores ongoing challenges in synchronizing low-level operations, underscoring the need for swift updates to mitigate real-world risks.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent News

Recent News