CVE-2025-55701
BaseFortify
Publication date: 2025-10-14
Last updated on: 2025-10-31
Assigner: Microsoft Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_10_1507 | to 10.0.10240.21161 (exc) |
| microsoft | windows_10_1507 | to 10.0.10240.21161 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8519 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8519 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7919 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7919 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6456 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6456 (exc) |
| microsoft | windows_11_22h2 | to 10.0.22621.6060 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.6060 (inc) |
| microsoft | windows_11_24h2 | to 10.0.26100.6899 (exc) |
| microsoft | windows_11_25h2 | to 10.0.26200.6899 (exc) |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | r2 |
| microsoft | windows_server_2012 | * |
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2016 | to 10.0.14393.8519 (inc) |
| microsoft | windows_server_2019 | to 10.0.17763.7919 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.4294 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.1913 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.6899 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1287 | The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is caused by improper validation of a specified type of input in Microsoft Windows. It allows an authorized attacker to locally elevate their privileges, meaning they can gain higher-level access rights than intended.
How can this vulnerability impact me? :
An attacker who already has some level of access to the system could exploit this vulnerability to gain higher privileges. This could allow them to perform actions that are normally restricted, potentially leading to full control over the affected system and compromising confidentiality, integrity, and availability.