A vital data disclosure vulnerability in Home windows Defender Firewall Service, which may permit licensed attackers to entry delicate heap reminiscence on affected methods.
The vulnerability, tracked as CVE-2025-62468, was assigned an Necessary severity score and launched on December 9, 2025.
The flaw stems from an out-of-bounds learn situation within the Home windows Defender Firewall Service part.
In keeping with Microsoft’s safety advisory, a certified attacker with high-level privileges can exploit this vulnerability to learn parts of heap reminiscence with out person interplay.
The vulnerability impacts the confidentiality of saved data however doesn’t have an effect on system integrity or availability. The vulnerability carries a CVSS v3.1 base rating of 4.4.
CVE IDCNAImpactCVSS ScoreCVE-2025-62468MicrosoftInformation Disclosure4.4
Labeled with the next traits: native assault vector, low assault complexity, excessive privileges required, and no person interplay wanted.
Microsoft assessed the chance of exploitation as unlikely, with no public exploit code or energetic exploitation reported on the time of disclosure.
Microsoft launched safety updates addressing CVE-2025-62468 throughout a number of Home windows platforms.
Affected Merchandise
ProductKB ArticleBuild NumbersWindows Server 2025KB5072033, KB507201410.0.26100.7462 / 10.0.26100.7392Windows 11 Model 24H2 (x64)KB5072033, KB507201410.0.26100.7462 / 10.0.26100.7392Windows 11 Model 24H2 (ARM64)KB5072033, KB507201410.0.26100.7462 / 10.0.26100.7392Windows Server 2022 23H2 (Server Core)KB507154210.0.25398.2025Windows 11 Model 23H2 (x64)KB507141710.0.22631.6345Windows 11 Model 23H2 (ARM64)KB507141710.0.22631.6345Windows 11 Model 25H2 (x64)KB5072033, KB507201410.0.26200.7462 / 10.0.26200.7392Windows 11 Model 25H2 (ARM64)KB5072033, KB507201410.0.26200.7462 / 10.0.26200.7392
The patches can be found for Home windows Server 2025, Home windows Server 2022, Home windows 11 Model 24H2, Home windows 11 Model 25H2, and Home windows 11 Model 23H2 on each x64 and ARM64-based methods.
Organizations can get hold of the required patches by Microsoft Replace or the Microsoft Replace Catalog. Home windows Server 2025 and up to date Home windows 11 variations acquired two varieties of updates.
Customary safety updates and safety hotpatch updates, permitting flexibility in deployment methods. Directors ought to promptly apply safety updates to mitigate publicity dangers.
The vulnerability requires high-level privilege escalation, limiting the rapid menace scope. However underscores the significance of limiting administrative entry and monitoring privileged person actions.
The out-of-bounds learn weak spot (CWE-125) permits attackers to entry reminiscence areas past meant boundaries. Efficiently exploiting this vulnerability requires membership in particular person teams with elevated permissions.
Making this a focused menace, primarily affecting organizations with strict entry controls and privileged-user monitoring protocols.
Safety researchers from Kunlun Lab deserve credit score for responsibly disclosing this vulnerability to Microsoft by coordinated disclosure channels.
Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.
