Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
Microsoft’s latest report from Patch Tuesday highlighted fixes for a significant number of vulnerabilities, two of which are known to be under active exploitation: CVE-2025-21391 and CVE-2025-21418.
CVE-2025-21391 is an elevation of privilege vulnerability in Windows Storage that has been actively exploited in the wild. This vulnerability allows a local, authenticated attacker to delete targeted files on a system, potentially leading to service disruptions. Notably, it does not permit the disclosure of confidential information.
The vulnerability arises from improper link resolution before file access, classified under CWE-59. An attacker can exploit this flaw by creating malicious symbolic links that redirect file operations to critical system files or user data, leading to unauthorized deletion. This could result in data corruption or loss and make services or the entire system unavailable.
CVE-2025-21418 is an elevation of privilege vulnerability in the Windows Ancillary Function Driver for WinSock (AFD.sys). This flaw allows a local, authenticated attacker to execute code with SYSTEM-level privileges by running a specially crafted program. Microsoft has confirmed active exploitation of this vulnerability in the wild.
The vulnerability has been assigned a CVSSv3 score of 7.8, indicating high severity. Exploitation requires local access and low privileges, with no user interaction necessary. The impact on confidentiality, integrity, and availability is rated as high.
Important considerations regarding these vulnerabilities: CVE-2025-21391 would only allow attackers to delete files on the targeted system. While this could lead to business interruptions, exploiting this CVE would only be a part of a wider attack. CVE-2025-21418, the other hand could be exploited by an attacker who has gained initial access to elevate privileges to SYSTEM access.
IOCs ADDED TO OUR THREAT FEEDS
At this time, there are no known IoCs associated with successful exploitation of CVE-2024-55591. Avertium remains vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
TTPs TO MONITOR
CVE-2025-21391: Windows Storage Elevation of Privilege
Tactic |
Technique |
Description |
Privilege Escalation |
T1068 - Exploitation for Privilege Escalation |
Attackers exploit this vulnerability to gain SYSTEM-level privileges. |
Persistence |
T1546.010 - Plist Modification |
If exploited in an automated attack, modifications to Windows storage permissions may be leveraged for persistence. |
Defense Evasion |
T1070.004 - File Deletion |
Since this vulnerability allows attackers to delete targeted files, they could use it to remove forensic evidence. |
Impact |
T1485 - Data Destruction |
If leveraged destructively, the attacker could delete key system files, causing system instability or denial-of-service (DoS). |
CVE-2025-21418: Windows AFD.sys Elevation of Privilege
Tactic |
Technique |
Description |
Privilege Escalation |
T1068 - Exploitation for Privilege Escalation |
Attackers use this vulnerability to escalate privileges from low-level user access to SYSTEM. |
Defense Evasion |
T1070 - Indicator Removal on Host |
Exploitation may allow attackers to clear logs or hide evidence of their activities. |
Persistence |
T1547.002 - Boot or Logon Autostart Execution: Authentication Package |
Attackers may use SYSTEM privileges to install a malicious authentication package for persistence. |
Execution |
T1203 - Exploitation for Client Execution |
If chained with a remote execution vulnerability, attackers could use this for full system compromise. |
additional recommendations + information
Apply Patches: Microsoft has released patches to address this vulnerability as part of their January 2025 Patch Tuesday updates. Users and organizations are strongly advised to apply these updates promptly to mitigate potential risks.
For users unable to immediately apply patches for CVE-2025-21418 and CVE-2025-21391, implementing the following workarounds can help mitigate potential exploitation risks:
CVE-2025-21418: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-21391: Windows Storage Elevation of Privilege Vulnerability
SUPPORTING DOCUMENTATION