Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges

Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges

Posted on May 13, 2025May 13, 2025 By CWS

Microsoft has patched a vital zero-day vulnerability within the Home windows Desktop Window Supervisor (DWM) Core Library, tracked as CVE-2025-30400, which was actively exploited within the wild to grant attackers SYSTEM-level privileges on affected techniques.

The flaw, disclosed as a part of Microsoft’s Could 2025 Patch Tuesday, underscores the persistent dangers posed by privilege escalation bugs in extensively deployed Home windows elements.

CVE-2025-30400 is classed as an “Elevation of Privilege” vulnerability stemming from a “use-after-free” reminiscence corruption concern within the DWM Core Library.

This weak spot, cataloged beneath CWE-416, permits a certified attacker to execute code with SYSTEM privileges-the highest degree of entry on Home windows systems-by exploiting improper reminiscence administration throughout the DWM course of.

Based on Microsoft, the vulnerability might be leveraged regionally by an attacker who already has entry to the goal machine. Profitable exploitation allows the attacker to bypass normal safety boundaries, doubtlessly permitting them to put in malicious software program, modify system settings, or entry delicate information with out detection.

Exploitation and Influence

Microsoft confirmed that CVE-2025-30400 had been actively exploited earlier than a patch was made out there, making it a real zero-day menace.

Though the vulnerability was not publicly disclosed previous to patching, proof of exploitation was detected within the wild, prompting Microsoft to induce fast motion from customers and directors.

“Use after free in Home windows DWM permits a certified attacker to raise privileges regionally,” Microsoft acknowledged in its advisory. The corporate attributed the invention of this flaw to its personal Menace Intelligence Heart, highlighting the continuing efforts to observe and reply to rising threats.

Attackers exploiting this bug may achieve SYSTEM privileges, granting them full management over the compromised gadget. This degree of entry is especially harmful, because it permits for persistent and stealthy assaults that may evade conventional safety measures.

The repair for CVE-2025-30400 was launched on Could 13, 2025, as a part of a broader safety replace that addressed a complete of 72 to 83 vulnerabilities, together with 5 zero-days that had been actively exploited.

Microsoft categorized the severity of this vulnerability as “Necessary” and assigned it a CVSS rating of seven.8, reflecting its vital threat to enterprise and shopper techniques.

Safety consultants and Microsoft strongly suggest that every one Home windows customers and directors apply the newest updates instantly to mitigate the danger of exploitation. Organizations are additionally suggested to allow automated updates and evaluation safety insurance policies to make sure speedy deployment of vital patches.

The invention and patching of CVE-2025-30400 spotlight the continuing problem of securing advanced working system elements like Home windows DWM.

With attackers actively exploiting such vulnerabilities to realize SYSTEM privileges, well timed patching and vigilant safety practices stay important for safeguarding Home windows environments from subtle threats.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:0Day, Attackers, DWM, Escalate, Privileges, Vulnerability, Windows

Post navigation

Previous Post: Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges
Next Post: Microsoft to Lay Off About 3% of Its Workforce

Related Posts

Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack Cyber Security News
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Cyber Security News
Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Cyber Security News
New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections Cyber Security News
Critical Vulnerability in AI Coding Tool Exposes Developers Critical Vulnerability in AI Coding Tool Exposes Developers Cyber Security News
TP-Link Security Flaws Allow DoS Attacks on Cameras TP-Link Security Flaws Allow DoS Attacks on Cameras Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark