CVE-2025-55236
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-09-12

Assigner: Microsoft Corporation

Description
Time-of-check time-of-use (toctou) race condition in Graphics Kernel allows an authorized attacker to execute code locally.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-09-12
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 11 associated CPEs
Vendor Product Version / Range
microsoft windows_10_1809 to 10.0.17763.7792 (exc)
microsoft windows_10_1809 to 10.0.17763.7792 (exc)
microsoft windows_10_21h2 to 10.0.19044.6332 (exc)
microsoft windows_10_22h2 to 10.0.19045.6332 (exc)
microsoft windows_11_22h2 to 10.0.22621.5909 (exc)
microsoft windows_11_23h2 to 10.0.22631.5909 (exc)
microsoft windows_11_24h2 to 10.0.26100.6508 (exc)
microsoft windows_server_2019 to 10.0.17763.7792 (exc)
microsoft windows_server_2022 to 10.0.20348.4106 (exc)
microsoft windows_server_2022_23h2 to 10.0.25398.1849 (exc)
microsoft windows_server_2025 to 10.0.26100.6508 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-367 The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check.
CWE-843 The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a time-of-check time-of-use (TOCTOU) race condition in the Graphics Kernel that allows an authorized attacker to execute code locally on the affected system.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can execute code locally with potentially high impact on confidentiality, integrity, and availability, which could lead to unauthorized actions or system compromise.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart