A highly critical security flaw registered as CVE-2025-53149 has been discovered on Microsoft Windows recently, targeting the Kernel Streaming WOW Thunk Service Driver (ksthunk.sys). The flaw is of the heap-based buffer overflow type and gives users of lower privilege the ability to elevate the access level, with the risk of obtaining administrative access to a system. The flaw existed within the CKSAutomationThunk::HandleArrayProperty() routine and has been remedied by Microsoft in the August 2025 advisory on security issues. Researchers at Crowdfense discovered the flaw internally by checking Windows internals and notified Microsoft of it on April 2025. Although the exploitation on a real-world basis hasn't been seen to date, the disclosure concerns many because of the high severity of the flaw. The underlying reason is due to inappropriate output buffer length handling by the system when it handles some multimedia property requests (KSPROPERTY_VPCONFIG_DDRAWSURFACEHANDLE). The vulnerable driver serves as the vital connection between 32-bit application code and 64-bit kernel objects on Windows-based systems. While handling some calls, the driver does not validate the necessary buffer size appropriately, which brings on the heap overflow state. Success by attackers could allow them to control memory so that they can inject as well as execute code of their choice with superior system-level privilege, completely sidestepping normal access restrictions and violating system integrity. As a corrective measure, Microsoft released a patch that resolves the driver's buffer validation logic. It is highly recommended that the users along with IT administrators upgrade the system to the latest Windows update at the soonest possible time. Organizations must also monitor systems for abnormal privilege escalation activity and review endpoint protections to curb attempts at exploitation. Proper management of patches remains an optimum deterrent against such weaknesses.
A powerful new iOS video injection tool has surfaced, enabling attackers to bypass biometric identity verification on jailbroken iPhones running iOS 15 or later. Designed to exploi...
Cyber attackers have comparatively been actively taking advantage of two severe vulnerabilities—CVE-2025-4427 (authentication bypass) and CVE-2025-4428 (code injection)—in Ivan...
Russian regional airline KrasAvia is facing a major IT outage, believed to be linked to a cyberattack, that has disrupted passenger services and internal operations. Since Friday, ...