Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges

Posted on December 17, 2025December 17, 2025 By CWS

Microsoft has confirmed a important out-of-bounds vulnerability within the Desktop Window Supervisor (DWM) that enables native attackers to escalate privileges to SYSTEM on affected Home windows techniques.

The vulnerability, recognized as CVE-2025-55681, resides within the dwmcore.dll part and impacts Home windows 10, Home windows 11, and associated server editions worldwide.

ProductAffected VersionsWindows 10All versionsWindows 11All versionsWindows Server 2016All versionsWindows Server 2019All versionsWindows Server 2022All versionsWindows Server 2025All variations

Understanding the Vulnerability

The flaw exists throughout the CBrushRenderingGraphBuilder::AddEffectBrush perform within the DWM core library.

A important part liable for rendering visible results and managing graphics operations.

Attackers who achieve native entry to an affected system can exploit improper buffer dealing with to execute code with elevated privileges.

FieldDetailsCVE IDCVE-2025-55681Vulnerability TypeElevation of Privilege / Out of Bounds Reminiscence AccessComponentdwmcore.dll (Desktop Home windows Supervisor Core Library)Affected FunctionCBrushRenderingGraphBuilder::AddEffectBrushCVSS v3.1 Score7.8 (Excessive)CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

The vulnerability requires no person interplay as soon as preliminary system entry is obtained.

Making it significantly harmful in enterprise environments the place a number of customers share techniques or the place distant entry options are deployed.

Safety researchers demonstrated the vulnerability in the course of the TyphoonPWN Home windows safety competitors, the place it achieved recognition for its exploitation reliability.

The vulnerability carries a CVSS v3.1 rating of seven.8, indicating excessive severity. An authenticated attacker with low-level person privileges can bypass safety controls and achieve unrestricted system entry.

Permitting set up of malware, modification of system configurations, or theft of delicate information. The exploit works most reliably on Home windows 11 techniques however stays practical on Home windows 10.

Although there’s diminished stability attributable to completely different heap reminiscence administration implementations in older Home windows variations. Microsoft has launched safety patches to handle this vulnerability as a part of its common safety updates.

In keeping with SSD-Disclosure studies, organizations ought to apply patches instantly to all affected Home windows techniques. Till patches are deployed, directors ought to prohibit alternatives for native code execution by implementing strict entry controls.

Turning off pointless providers and implementing the precept of least privilege throughout person accounts.

System directors are urged to prioritize deploying this important replace, given the extreme nature of the privilege escalation impression and the low complexity required for exploitation.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Desktop, Escalate, Manager, Microsoft, OutofBounds, Privileges, Vulnerability, Windows

Post navigation

Previous Post: APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
Next Post: Hackers Could Take Control of Car Dashboard by Hacking Its Modem

Related Posts

What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware Cyber Security News
From SOC to SOAR Automating Security Operations Cyber Security News
SoundCloud Confirms Data Breach Following VPN and Access Issues Cyber Security News
10 Best Malware Analysis Tools Cyber Security News
New ModStealer Evade Antivirus Detection to Attack macOS Users and Steal Sensitive Data Cyber Security News
OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark