Security
Headlines
HeadlinesLatestCVEs

Latest News

CVE-2025-55682: Windows BitLocker Security Feature Bypass Vulnerability

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Microsoft Security Response Center
#vulnerability#windows#auth#Windows BitLocker#Security Vulnerability
CVE-2025-55683: Windows Kernel Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

CVE-2025-55334: Windows Kernel Security Feature Bypass Vulnerability

Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally.

CVE-2025-53717: Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

CVE-2025-25004: PowerShell Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the "NT AUTHORITY\\SYSTEM" account.

CVE-2025-59294: Windows Taskbar Live Preview Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.

CVE-2025-59292: Azure Compute Gallery Elevation of Privilege Vulnerability

External control of file name or path in Azure Compute Gallery allows an authorized attacker to elevate privileges over a network.

CVE-2025-59295: Windows URL Parsing Remote Code Execution Vulnerability

**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability.