Windows Task Host Vulnerability - CISA Flags Active Exploits

CISA warns of a critical vulnerability in Windows Task Host that allows privilege escalation. All organizations are urged to apply patches immediately to prevent exploitation.

VulnerabilitiesHIGHUpdated: Published:
Featured image for Windows Task Host Vulnerability - CISA Flags Active Exploits

Original Reporting

BCBleepingComputer·Sergiu Gatlan

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, a flaw in Windows lets attackers take control of your system.

What Happened

CISA has issued a warning to U.S. government agencies about a Windows Task Host vulnerability, tracked as CVE-2025-60710. This flaw allows attackers to escalate their privileges to SYSTEM level, giving them full control over affected devices. The vulnerability stems from a weakness in how Windows processes links, specifically in the Task Host component, which manages background tasks.

The Flaw

The vulnerability arises from an improper link resolution before file access, known as link following. This issue affects Windows 11 and Windows Server 2025. Local attackers with basic user permissions can exploit this vulnerability through low-complexity attacks, making it particularly concerning for organizations.

What's at Risk

The risk is significant, as gaining SYSTEM privileges can lead to complete control over the compromised device. This type of vulnerability is a common attack vector for malicious actors, and CISA has emphasized its potential impact on federal agencies and other organizations.

Patch Status

Microsoft released a patch for this vulnerability in November 2025. However, CISA has now added it to its catalog of actively exploited vulnerabilities, urging agencies to secure their systems within two weeks as per the Binding Operational Directive (BOD) 22-01. While the directive primarily targets federal agencies, CISA recommends that all organizations apply the patches to safeguard their networks.

Immediate Actions

Organizations should take the following steps: CISA has not disclosed specific details about the attacks exploiting this vulnerability, and Microsoft has yet to update its advisory to confirm active exploitation. However, the urgency of the situation cannot be overstated, as this vulnerability poses a significant risk to the federal enterprise and beyond.

Containment

  • 1.Apply the Microsoft patch for CVE-2025-60710 immediately.
  • 2.Monitor for unusual activity on systems that may be affected.

Remediation

  • 3.Follow CISA's guidance for implementing mitigations and securing cloud services.
  • 4.Consider discontinuing the use of affected products if mitigations are not available.

🔒 Pro Insight

🔒 Pro insight: The exploitation of CVE-2025-60710 highlights the ongoing risk of privilege escalation vulnerabilities in widely used Windows components.

BCBleepingComputer· Sergiu Gatlan
Read Original

Related Pings