CVE-2025-59208
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-10-17

Assigner: Microsoft Corporation

Description
Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-10-17
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 22 associated CPEs
Vendor Product Version / Range
microsoft windows_10_1507 to 10.0.10240.21161 (exc)
microsoft windows_10_1507 to 10.0.10240.21161 (exc)
microsoft windows_10_1607 to 10.0.14393.8519 (exc)
microsoft windows_10_1607 to 10.0.14393.8519 (exc)
microsoft windows_10_1809 to 10.0.17763.7919 (exc)
microsoft windows_10_1809 to 10.0.17763.7919 (exc)
microsoft windows_10_21h2 to 10.0.19044.6456 (exc)
microsoft windows_10_22h2 to 10.0.19045.6456 (exc)
microsoft windows_11_22h2 to 10.0.22621.6060 (exc)
microsoft windows_11_23h2 to 10.0.22631.6060 (inc)
microsoft windows_11_24h2 to 10.0.26100.6899 (exc)
microsoft windows_11_25h2 to 10.0.26200.6899 (exc)
microsoft windows_server_2008 *
microsoft windows_server_2008 *
microsoft windows_server_2008 r2
microsoft windows_server_2012 *
microsoft windows_server_2012 r2
microsoft windows_server_2016 to 10.0.14393.8519 (inc)
microsoft windows_server_2019 to 10.0.17763.7919 (exc)
microsoft windows_server_2022 to 10.0.20348.4294 (exc)
microsoft windows_server_2022_23h2 to 10.0.25398.1913 (exc)
microsoft windows_server_2025 to 10.0.26100.6899 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds read in the Windows MapUrlToZone function, which allows an unauthorized attacker to disclose information over a network.


How can this vulnerability impact me? :

An attacker could exploit this vulnerability to gain unauthorized access to sensitive information by reading memory outside the intended bounds, potentially leading to information disclosure over a network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart