Skip to main content Skip to local navigation

Microsoft Windows Kernel Vulnerability (CVE-2025-62215)

 

A picture containing text  Description automatically generated

 

Service Advisory 


Microsoft has released a security update to address a zero-day vulnerability in the Windows Kernel (CVE-2025-62215) that could allow attackers to escalate privileges to System level.

Severity level
:
CVSS Score: 7.0 /High.

Description
:
Windows Kernel is the core component of the Windows operating system responsible for managing system resources and hardware interactions. CVE-2025-62215 is a race condition vulnerability caused by improper synchronization when multiple threads access shared kernel resources concurrently. An attacker with local access can exploit this flaw by running a specially crafted application that triggers the race condition, potentially leading to memory corruption and privilege escalation.

Affected Versions
:
Windows 10.
Windows 11.
Windows Server 2019 through Windows server 2025.

Impact:
Successful exploitation allows attackers to escalate privileges to SYSTEM level, giving full control over the affected machine.

Resolution:
Microsoft has released patches to address this vulnerability. the latest patched versions of Windows Server as provided by Microsoft. If immediate patching is not feasible:

  • Restrict local access to trusted users only.
  • Monitor for unusual kernel-level activity.

 

Reference:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215

https://nvd.nist.gov/vuln/detail/CVE-2025-62215

https://www.cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-november-2025-monthly-rollup-av25-739

https://socradar.io/november-2025-patch-tuesday-microsoft-cve-2025-62215/

 

UIT Information Security

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: York University, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web