CVE-2025-49723
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-16
Assigner: Microsoft Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_10_1809 | to 10.0.17763.7558 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7558 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6093 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6093 (exc) |
| microsoft | windows_11_22h2 | to 10.0.22621.5624 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.5624 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.4652 (exc) |
| microsoft | windows_server_2019 | to 10.0.17763.7558 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.3932 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.1732 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.4652 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a missing authorization issue in the Windows StateRepository API that allows an authorized attacker with local access to perform tampering. Essentially, it means that the API does not properly check permissions, enabling an attacker who already has some level of access to manipulate system state data improperly.
How can this vulnerability impact me? :
The vulnerability can lead to significant impacts including unauthorized modification of system state data, which can compromise system integrity, availability, and confidentiality. Given the high CVSS score (8.8) with high impact on confidentiality, integrity, and availability, an attacker could cause serious damage or disruption to affected systems.