Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2025-53717: Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

Microsoft Security Response Center
#vulnerability#windows#auth#Windows Virtualization-Based Security (VBS) Enclave#Security Vulnerability
CVE-2025-59294: Windows Taskbar Live Preview Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.

CVE-2025-59295: Windows URL Parsing Remote Code Execution Vulnerability

**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability.

CVE-2025-59502: Remote Procedure Call Denial of Service Vulnerability

Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.

CVE-2025-53139: Windows Hello Security Feature Bypass Vulnerability

Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.

CVE-2025-59280: Windows SMB Client Tampering Vulnerability

Improper authentication in Windows SMB Server allows an authorized attacker to perform tampering over a network.

CVE-2025-59277: Windows Authentication Elevation of Privilege Vulnerability

**How could an attacker exploit this vulnerability?** To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.