We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-24084

Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability



Description

Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.

Reserved 2025-01-16 | Published 2025-03-11 | Updated 2025-03-13 | Assigner microsoft


HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-822: Untrusted Pointer Dereference

Product status

10.0.20348.0 before 10.0.20348.3328
affected

10.0.22621.0 before 10.0.22621.5039
affected

10.0.26100.0 before 10.0.26100.3476
affected

10.0.22631.0 before 10.0.22631.5039
affected

10.0.22631.0 before 10.0.22631.5039
affected

10.0.25398.0 before 10.0.25398.1486
affected

10.0.26100.0 before 10.0.26100.3476
affected

10.0.26100.0 before 10.0.26100.3476
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24084 (Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability) vendor-advisory

cve.org (CVE-2025-24084)

nvd.nist.gov (CVE-2025-24084)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-24084

Support options

Helpdesk Chat, Email, Knowledgebase