Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2

Posted on September 12, 2025September 12, 2025 By CWS

A brand new kernel deal with leak vulnerability has been found within the newest variations of Home windows 11 (24H2) and Home windows Server 2022 (24H2).

The flaw, recognized as CVE-2025-53136, was satirically launched by a Microsoft patch supposed to repair a separate vulnerability, CVE-2024-43511.

In accordance with Crowdfense, the brand new bug undermines latest safety enhancements in Home windows, offering a dependable methodology for attackers to bypass Kernel Deal with Area Structure Randomization (KASLR), a important protection mechanism.

In latest updates, notably beginning with the 24H2 variations of Home windows 11 and Home windows Server 2022, Microsoft took vital steps to harden the working system kernel in opposition to assaults.

The corporate restricted entry to kernel base addresses by limiting features like NtQuerySystemInformation().

This variation meant that solely extremely privileged processes might retrieve this data, successfully neutralizing a typical method utilized by attackers to bypass KASLR and making it a lot tougher to use kernel vulnerabilities.

Nonetheless, evaluation of the October 2024 patch for CVE-2024-43511, a Time-of-check Time-of-use (TOCTOU) race situation vulnerability, revealed a important error.

In fixing the unique bug, builders modified the RtlSidHashInitialize() operate. The brand new code briefly writes a delicate kernel pointer from the TOKEN construction right into a user-controlled buffer.

Though the pointer is shortly eliminated, it creates a small however exploitable time window for an attacker to learn it.

Exploiting The Race Situation

An attacker can set off this vulnerability by making a particular system name (NtQueryInformationToken() with the TokenAccessInformation class) whereas concurrently working a separate thread to learn the reminiscence location the place the kernel deal with is briefly leaked.

Regardless of being a race situation, the time window is reportedly vast sufficient to make the exploit extremely dependable. A proof-of-concept demonstrates that the leaked TOKEN deal with might be obtained nearly each time the exploit is run, Crowdfense added.

The impression is important as a result of this leak works on the newest, absolutely patched variations of Home windows 11 and might be executed from low-privilege environments, together with sandboxed AppContainer functions. Whereas the vulnerability itself solely leaks data, it serves as a robust primitive.

When chained with a separate bug, reminiscent of a “write-what-where” situation, an attacker might obtain a full Native Privilege Escalation (LPE) by overwriting the Privileges discipline of the TOKEN object.

This discovery highlights a typical problem in software program safety: fixing one vulnerability can generally inadvertently create one other. The researcher who found the flaw adopted a accountable disclosure course of, which started on April 8, 2025.

After some preliminary confusion the place the report was mistakenly closed as a reproduction, Microsoft finally acknowledged the brand new, legitimate bug on April 25 and assigned it CVE-2025-53136 in August.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:11Server, 24H2, Address, Flaw, Kernel, Leak, Microsoft, Patch, Reveals, Vulnerability, Windows

Post navigation

Previous Post: F5 to Acquire CalypsoAI for $180 Million
Next Post: New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware

Related Posts

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware Cyber Security News
ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks Cyber Security News
GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition Cyber Security News
Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News
Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security Cyber Security News
Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Let Attackers Gain Full Admin Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts
  • AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks
  • Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently
  • Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
  • New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts
  • AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks
  • Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently
  • Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
  • New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News