{"uuid": "662ff61a-32f9-4370-94df-bb7a4a5686b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21418", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3911", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21418\n\ud83d\udc80 Vulnerability: Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability\n\ud83c\udfe2 Vendor: Microsoft\n\ud83d\udda5\ufe0f Product: Windows\n\ud83d\udd25 Known Ransomware Use: Unknown\n\ud83d\udea8 Exploitation Links: 0 reported\n\ud83d\udcca CVSS Score: N/A\n\ud83d\udd39 Description: Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\ud83d\udd27 Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\ud83d\udccf Published: 2025-02-11T00:00:00Z\n\ud83d\udcc5 Due Date: 2025-03-04T00:00:00Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-11T20:26:37.000000Z"}