7.8
CVE-2025-54916
- EPSS 0.12%
- Veröffentlicht 09.09.2025 17:01:00
- Zuletzt bearbeitet 02.10.2025 14:47:59
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
Windows NTFS Remote Code Execution Vulnerability
Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.21128
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.21128
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.8422
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.8422
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.7792
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.7792
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.6332
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.6332
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.5909
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.5909
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.6508
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx86
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.8422
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.7792
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.4106
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1849
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.6508
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.12% | 0.304 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secure@microsoft.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).