Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows Ancillary Function Driver for WinSock, tracked as CVE-2025-32709. This use-after-free flaw enables local attackers with basic user privileges to gain SYSTEM-level access, posing significant risks to unpatched systems. First publicly documented on 13 May 2025, the vulnerability carries a base score […]
The post Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Mayura Kathir
Source: gbHackers
Source Link: https://gbhackers.com/windows-ancillary-for-winsock-0-day-vulnerability-exploited/