Description
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
Published: 2025-12-09
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation via Heap-based Buffer Overflow
Action: Patch immediately
AI Analysis

Impact

The vulnerability is a heap‑based buffer overflow in the Windows Win32K graphics subsystem, specifically the GRFX component. By overflowing a heap buffer, an attacker who already has local access can trigger arbitrary code execution within the context of the Win32K service, which then grants them elevated privileges on the host system. This leads to a local privilege escalation issue, as the attacker can gain higher levels of control—potentially administrator rights—without needing to compromise other accounts or networks. The weakness is classified as CWE‑122.

Affected Systems

Affected builds include Microsoft Windows 10 1607, 1809, 21H2 and 22H2, as well as Windows 11 22H3 and 23H2, covering both 32‑bit and 64‑bit (where applicable). Server editions impacted are Windows Server 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, and 2022, with all installations that use Win32K, including Server Core configurations. These are the only platforms explicitly listed as vulnerable in the canonical CNA data.

Risk and Exploitability

With a CVSS score of 7.8 the severity is high, yet the EPSS score remains below 1 %, indicating current exploitation in the wild is unlikely. The vulnerability is not listed in CISA’s KEV catalog, so no known widespread attacks exist at the moment. Exploitation requires an authorized local attacker with access to the Win32K service, so the most probable attack vector is a local user or process that can trigger the GRFX heap overflow. The impact is confined to the local machine, but success would allow the attacker to compromise any data or services that the elevated account can access.

Generated by OpenCVE AI on April 20, 2026 at 16:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft security update for CVE‑2025‑62458 as soon as it becomes available
  • Enforce the principle of least privilege by removing unnecessary local administrative rights from user accounts
  • Implement monitoring or logging for unusual privilege escalation events on the affected systems

Generated by OpenCVE AI on April 20, 2026 at 16:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 12 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows Server 2008
CPEs cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
Vendors & Products Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows Server 2008

Tue, 09 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Description Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
Title Win32k Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 10 1607
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows Server 2008 R2
Microsoft windows Server 2012
Microsoft windows Server 2012 R2
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Weaknesses CWE-122
CPEs cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 10 1607
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows Server 2008 R2
Microsoft windows Server 2012
Microsoft windows Server 2012 R2
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 1607 Windows 10 1809 Windows 10 21h2 Windows 10 21h2 Windows 10 22h2 Windows 10 22h2 Windows 11 23h2 Windows 11 23h2 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019 Windows Server 2022
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-16T14:18:30.205Z

Reserved: 2025-10-14T18:24:58.483Z

Link: CVE-2025-62458

cve-icon Vulnrichment

Updated: 2025-12-09T20:18:09.520Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T18:15:57.503

Modified: 2025-12-12T20:03:32.310

Link: CVE-2025-62458

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:15:11Z

Weaknesses