CVE-2025-32709
ENISA EUVD: EUVD-2025-14439 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 5, 2026
2 articles
Published: 2025-05-13
EPSS Score
Source: FIRST.org · 2026-05-23
0.76%
probability
This CVE has a 0.76% probability
of being exploited in the next 30 days.
0%
Top 73.6th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Description
NVDNull pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Affected Products
Microsoft
Windows 10 Version 1507
10.0.10240.0
Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
May 13, 2025
Reported by
Anonymous
Root Cause Analysis
???
Exploits & PoC
AdnanSiyat/How-to-Patch-CVE-2025-32709
Real-world patching workflow for CVE-2025-32709. From hotfix install to SIEM alert validation—this repo documents every step with screenshots, command
0
2025-09-04
1 repo — triés par ⭐
Rechercher sur GitHub ↗
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709
vendor-advisory
patch
Signal Intelligence
Confidence
95%
EPSS
0.76%
CVSS v3.1
7.8
Mentions
2
Last Seen
May 13, 2025
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Analyst Note
Auto-imported from Google Project Zero — confirmed zero-day by definition.
Threat Actors 5
Triage Info
Decided atMar 05, 2026
Published DateMay 13, 2025