CVE-2025-59513
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-11-11
Last updated on: 2025-11-17
Assigner: Microsoft Corporation
Description
Description
Out-of-bounds read in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to disclose information locally.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_10_1607 | to 10.0.14393.8594 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8594 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.8027 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.8027 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6575 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6575 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.6199 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.7092 (exc) |
| microsoft | windows_11_25h2 | to 10.0.26200.7092 (exc) |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | r2 |
| microsoft | windows_server_2016 | to 10.0.14393.8594 (exc) |
| microsoft | windows_server_2019 | to 10.0.17763.8027 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.4346 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.1965 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.7092 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds read in the Windows Bluetooth RFCOM Protocol Driver. It allows an authorized attacker to read memory outside the intended bounds locally, potentially disclosing sensitive information.
How can this vulnerability impact me? :
An attacker with local authorized access could exploit this vulnerability to disclose sensitive information from memory, which could lead to information leakage without affecting system integrity or availability.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70