7.5
CVE-2025-32725
- EPSS 0.18%
- Published 10.06.2025 17:02:30
- Last modified 10.07.2025 16:17:56
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.8148
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.7434
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.3745
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1665
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.4270
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.18% | 0.396 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@microsoft.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-693 Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.