Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges

Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges

Posted on December 17, 2025December 17, 2025 By CWS

Microsoft has confirmed a important out-of-bounds vulnerability within the Desktop Window Supervisor (DWM) that enables native attackers to escalate privileges to SYSTEM on affected Home windows techniques.

The vulnerability, recognized as CVE-2025-55681, resides within the dwmcore.dll part and impacts Home windows 10, Home windows 11, and associated server editions worldwide.

ProductAffected VersionsWindows 10All versionsWindows 11All versionsWindows Server 2016All versionsWindows Server 2019All versionsWindows Server 2022All versionsWindows Server 2025All variations

Understanding the Vulnerability

The flaw exists throughout the CBrushRenderingGraphBuilder::AddEffectBrush perform within the DWM core library.

A important part liable for rendering visible results and managing graphics operations.

Attackers who achieve native entry to an affected system can exploit improper buffer dealing with to execute code with elevated privileges.

FieldDetailsCVE IDCVE-2025-55681Vulnerability TypeElevation of Privilege / Out of Bounds Reminiscence AccessComponentdwmcore.dll (Desktop Home windows Supervisor Core Library)Affected FunctionCBrushRenderingGraphBuilder::AddEffectBrushCVSS v3.1 Score7.8 (Excessive)CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

The vulnerability requires no person interplay as soon as preliminary system entry is obtained.

Making it significantly harmful in enterprise environments the place a number of customers share techniques or the place distant entry options are deployed.

Safety researchers demonstrated the vulnerability in the course of the TyphoonPWN Home windows safety competitors, the place it achieved recognition for its exploitation reliability.

The vulnerability carries a CVSS v3.1 rating of seven.8, indicating excessive severity. An authenticated attacker with low-level person privileges can bypass safety controls and achieve unrestricted system entry.

Permitting set up of malware, modification of system configurations, or theft of delicate information. The exploit works most reliably on Home windows 11 techniques however stays practical on Home windows 10.

Although there’s diminished stability attributable to completely different heap reminiscence administration implementations in older Home windows variations. Microsoft has launched safety patches to handle this vulnerability as a part of its common safety updates.

In keeping with SSD-Disclosure studies, organizations ought to apply patches instantly to all affected Home windows techniques. Till patches are deployed, directors ought to prohibit alternatives for native code execution by implementing strict entry controls.

Turning off pointless providers and implementing the precept of least privilege throughout person accounts.

System directors are urged to prioritize deploying this important replace, given the extreme nature of the privilege escalation impression and the low complexity required for exploitation.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Desktop, Escalate, Manager, Microsoft, OutofBounds, Privileges, Vulnerability, Windows

Post navigation

Previous Post: APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
Next Post: Hackers Could Take Control of Car Dashboard by Hacking Its Modem

Related Posts

MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild Cyber Security News
Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News
CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks Cyber Security News
CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems Cyber Security News
Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News