4.3
CVE-2025-21219
- EPSS 0.21%
- Published 14.01.2025 18:15:33
- Last modified 27.01.2025 18:45:30
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
MapUrlToZone Security Feature Bypass Vulnerability
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20890
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.20890
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.7699
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.7699
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.6775
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.6775
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.5371
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.5371
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.4751
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.4751
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.2894
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.7699
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.6775
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.3091
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1369
Microsoft ≫ Windows Server 2025 HwPlatformx64 Version < 10.0.26100.2894
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.44 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@microsoft.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
|
CWE-41 Improper Resolution of Path Equivalence
The product is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use of special characters in file and directory names. The associated manipulations are intended to generate multiple names for the same object.