CVE-2025-24985

ENISA EUVD: EUVD-2025-6321 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 5 articles Published: 2025-03-11

EPSS Score

Source: FIRST.org · 2026-05-23
2.23%
probability
This CVE has a 2.23% probability of being exploited in the next 30 days.
0% Top 84.7th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.

Affected Products

Microsoft
Windows 10 Version 1507
10.0.10240.0
Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0

Attack Intelligence

Google Project Zero

Patched
March 11, 2025
Reported by
Anonymous
Root Cause Analysis
???

Exploits & PoC

airbus-cert/cve-2025-24985

Detection of malicious VHD files for CVE-2025-24985

2 2025-04-02
1 repo — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 2.23%
CVSS v3.1 7.8
Mentions 5
Last Seen Mar 12, 2025

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Fast FAT File System Driver Remote Code Execution Vulnerability

Analyst Note

This CVE is confirmed as a zero-day with active exploitation since 2023, documented by Google Project Zero, and formally patched by Microsoft in March 2025. The high CVSS score (7.8), local code execution capability, and coverage by reputable security sources (BleepingComputer) substantiate the confirmed status.

Threat Actors 25

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
APT 29
apt_group Information theft and espionage 🇷🇺 RU
Hacking Team
apt_group 🇮🇹 IT
Lotus Blossom
apt_group Information theft and espionage 🇨🇳 CN
Mirage
apt_group Information theft and espionage 🇨🇳 CN
Volt Typhoon
apt_group Information theft and espionage 🇨🇳 CN
Group 27
apt_group Information theft and espionage 🇨🇳 CN
SideWinder
apt_group 🇮🇳 IN
Larva-208
apt_group 🇷🇺 RU
UNC3886
apt_group Information theft and espionage 🇨🇳 CN
Storm-1865
apt_group
UAC-0050
apt_group 🇷🇺 RU
Rocke
apt_group 🇨🇳 CN
APT 6
apt_group Information theft and espionage 🇨🇳 CN
Grayling
apt_group Information theft and espionage 🇨🇳 CN
Red Dev 17
apt_group 🇨🇳 CN
Red October
apt_group 🇷🇺 RU
The White Company
apt_group Information theft and espionage 🇨🇳 CN
TA583
apt_group Global
Mana Team
apt_group 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN
Cyber Alliance
apt_group 🇺🇦 UA
Lurk
apt_group Financial crime 🇷🇺 RU
Dust Storm
apt_group Information theft and espionage 🇨🇳 CN
TA2725
apt_group 🇧🇷 BR

Triage Info

Decided atMar 03, 2026
Published DateMar 11, 2025