CVE-2025-60710 - Elevation of Privilege in Host Process for Windows Tasks
Technical Analysis
Section titled “Technical Analysis”The core of this vulnerability lies in Improper Link Resolution before File Access, documented under CWE-59. The flaw is located within the interaction between the Host Process for Windows Tasks (taskhostw.exe) and the Windows AI Recall feature.
Specifically, the scheduled task \Microsoft\Windows\WindowsAI\Recall\PolicyConfiguration performs file operations on a target directory without sufficiently validating whether the path is a symbolic link or a junction point. This “link following” behavior allows an attacker to redirect a SYSTEM-level file operation toward a sensitive target.
Vulnerable Components
Section titled “Vulnerable Components”- Process:
taskhostw.exe - Feature: Windows AI Recall
- Affected Builds: Windows 11 25H2 (10.0.26200.0 to 10.0.26200.7171)
Exploitation Flow
Section titled “Exploitation Flow”The exploitation follows a precise sequence to achieve arbitrary folder deletion and subsequent privilege escalation:
- Environment Check: The attacker verifies the OS build version to ensure it falls within the vulnerable range.
- Junction Creation: The attacker creates a directory junction in the
%LOCALAPPDATA%\CoreAIPlatform.00\UKPdirectory. - Targeting: The junction is configured to point to a protected system directory or a critical configuration file.
- Trigger: The
PolicyConfigurationscheduled task is triggered (either naturally or via manual manipulation), causingtaskhostw.exeto follow the link. - Privilege Gain: Because the task runs as SYSTEM, the linked operation is performed with highest privileges, allowing for the deletion or modification of restricted files, which can be leveraged to compromise the kernel or a system service.
Forensic Investigation
Section titled “Forensic Investigation”From a forensic perspective, the following traces are critical for identifying an attempted or successful exploitation of CVE-2025-60710.
File System Artefacts
Section titled “File System Artefacts”- Path Analysis: Investigation of
%LOCALAPPDATA%\CoreAIPlatform.00\UKP. The presence of GUID-named subdirectories that are identified as Reparse Points (junctions or symlinks) is a strong Indicator of Compromise (IoC). - Link Following: Look for unexpected directory junctions pointing towards
C:\Windows\System32or other sensitive system paths.
Log Analysis
Section titled “Log Analysis”- Process Execution: Monitor for
taskhostw.exestarting with unusual arguments or interacting with theCoreAIPlatformdirectory. - Event IDs:
- Event ID 4688: Process Creation. Look for
taskhostw.exeinteracting with theUKPpath. - Event ID 4663: An attempt was made to access an object. Check for SYSTEM-level access to user-profile paths.
- Event ID 4688: Process Creation. Look for
Detection
Section titled “Detection”To detect this vulnerability, a combination of build verification and filesystem analysis is required.
Detection Logic
Section titled “Detection Logic”- Build Verification: Confirm OS Build is between
10.0.26200.0and10.0.26200.7171. - Task Audit: Verify the existence and state of the
\Microsoft\Windows\WindowsAI\Recall\PolicyConfigurationtask. - Reparse Point Scan: Scan the
UKPdirectory for any symlinks or junctions.
Threat Hunting Query (KQL/Splunk)
Section titled “Threat Hunting Query (KQL/Splunk)”index=windows event_id=4688 process_name="taskhostw.exe"| search "CoreAIPlatform.00\UKP"Mitigation
Section titled “Mitigation”Immediate action is required to secure vulnerable systems.
- Official Patch: Apply the latest Microsoft Security Updates for Windows 11 25H2.
- Temporary Workaround: Disable the following scheduled task:
\Microsoft\Windows\WindowsAI\Recall\PolicyConfiguration. - Hardening: Restrict write permissions on
%LOCALAPPDATA%\CoreAIPlatform.00\UKPto prevent the creation of new junctions.