URL has been copied successfully!
Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access

Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows Ancillary Function Driver for WinSock, tracked as CVE-2025-32709. This use-after-free flaw enables local attackers with basic user privileges to gain SYSTEM-level access, posing significant risks to unpatched systems. First publicly documented on 13 May 2025, the vulnerability carries a base score […] The post Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

First seen on gbhackers.com

Jump to article: gbhackers.com/windows-ancillary-for-winsock-0-day-vulnerability-exploited/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link