CVE-2025-24985
ENISA EUVD: EUVD-2025-6321 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
5 articles
Published: 2025-03-11
EPSS Score
Source: FIRST.org · 2026-05-23
2.23%
probability
This CVE has a 2.23% probability
of being exploited in the next 30 days.
0%
Top 84.7th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Description
NVDInteger overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
Affected Products
Microsoft
Windows 10 Version 1507
10.0.10240.0
Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-122
· Heap-based Buffer Overflow
CWE-190
· Integer Overflow
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-682
· Incorrect Calculation
CWE-787
· Out-of-bounds Write
CWE-788
· Access of Memory Past End of Buffer
Google Project Zero
Patched
March 11, 2025
Reported by
Anonymous
Root Cause Analysis
???
Exploits & PoC
airbus-cert/cve-2025-24985
Detection of malicious VHD files for CVE-2025-24985
2
2025-04-02
1 repo — triés par ⭐
Rechercher sur GitHub ↗
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985
vendor-advisory
patch
Signal Intelligence
Confidence
92%
EPSS
2.23%
CVSS v3.1
7.8
Mentions
5
Last Seen
Mar 12, 2025
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
Analyst Note
This CVE is confirmed as a zero-day with active exploitation since 2023, documented by Google Project Zero, and formally patched by Microsoft in March 2025. The high CVSS score (7.8), local code execution capability, and coverage by reputable security sources (BleepingComputer) substantiate the confirmed status.
Threat Actors 25
Lazarus Group
apt_group
Information theft and espionage
🇰🇵 KP
APT 29
apt_group
Information theft and espionage
🇷🇺 RU
Hacking Team
apt_group
🇮🇹 IT
Lotus Blossom
apt_group
Information theft and espionage
🇨🇳 CN
Mirage
apt_group
Information theft and espionage
🇨🇳 CN
Volt Typhoon
apt_group
Information theft and espionage
🇨🇳 CN
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
SideWinder
apt_group
🇮🇳 IN
Larva-208
apt_group
🇷🇺 RU
UNC3886
apt_group
Information theft and espionage
🇨🇳 CN
Storm-1865
apt_group
UAC-0050
apt_group
🇷🇺 RU
Rocke
apt_group
🇨🇳 CN
APT 6
apt_group
Information theft and espionage
🇨🇳 CN
Grayling
apt_group
Information theft and espionage
🇨🇳 CN
Red Dev 17
apt_group
🇨🇳 CN
Red October
apt_group
🇷🇺 RU
The White Company
apt_group
Information theft and espionage
🇨🇳 CN
TA583
apt_group
Global
Mana Team
apt_group
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Cyber Alliance
apt_group
🇺🇦 UA
Lurk
apt_group
Financial crime
🇷🇺 RU
Dust Storm
apt_group
Information theft and espionage
🇨🇳 CN
TA2725
apt_group
🇧🇷 BR
Triage Info
Decided atMar 03, 2026
Published DateMar 11, 2025