CVE-2025-53799
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-10-02
Assigner: Microsoft Corporation
Description
Description
Use of uninitialized resource in Windows Imaging Component allows an unauthorized attacker to disclose information locally.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | office | to 16.0.19220.20000 (exc) |
| microsoft | windows_10_1507 | to 10.0.10240.21128 (exc) |
| microsoft | windows_10_1507 | to 10.0.10240.21128 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8422 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8422 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7792 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7792 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6332 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6332 (exc) |
| microsoft | windows_11_22h2 | to 10.0.22621.5909 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.5909 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.6508 (exc) |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | r2 |
| microsoft | windows_server_2012 | * |
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2016 | to 10.0.14393.8422 (exc) |
| microsoft | windows_server_2019 | to 10.0.17763.7792 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.4106 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.1849 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.6508 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the use of an uninitialized resource in the Windows Imaging Component, which allows an unauthorized attacker to locally disclose information.
How can this vulnerability impact me? :
An attacker could exploit this vulnerability to gain access to sensitive information on the affected system without authorization, potentially leading to information disclosure.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70