CVE-2025-53139
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-10-23

Assigner: Microsoft Corporation

Description
Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-10-23
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
microsoft windows_10_21h2 to 10.0.19044.6456 (exc)
microsoft windows_10_22h2 to 10.0.19045.6456 (exc)
microsoft windows_11_22h2 to 10.0.22621.6060 (exc)
microsoft windows_11_23h2 to 10.0.22631.6060 (inc)
microsoft windows_11_24h2 to 10.0.26100.6899 (exc)
microsoft windows_11_25h2 to 10.0.26200.6899 (exc)
microsoft windows_server_2025 to 10.0.26100.6899 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-319 The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the cleartext transmission of sensitive information in Windows Hello, which allows an unauthorized attacker to locally bypass a security feature.


How can this vulnerability impact me? :

An attacker could exploit this vulnerability to bypass security features on a local system, potentially gaining unauthorized access to sensitive information or functionality.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart