7.1
CVE-2025-21391
- EPSS 1.81%
- Veröffentlicht 11.02.2025 18:15:37
- Zuletzt bearbeitet 12.02.2025 18:14:53
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Windows Storage Elevation of Privilege Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20915
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.20915
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.7785
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.7785
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.6893
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.6893
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.5487
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.5487
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.4890
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.4890
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.3194
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.7785
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.6893
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.3207
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1425
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.3194
11.02.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows Storage Link Following Vulnerability
SchwachstelleMicrosoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.
BeschreibungApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.81% | 0.822 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
secure@microsoft.com | 7.1 | 1.8 | 5.2 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.