Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges

Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges

Posted on December 17, 2025December 17, 2025 By CWS

Microsoft has confirmed a important out-of-bounds vulnerability within the Desktop Window Supervisor (DWM) that enables native attackers to escalate privileges to SYSTEM on affected Home windows techniques.

The vulnerability, recognized as CVE-2025-55681, resides within the dwmcore.dll part and impacts Home windows 10, Home windows 11, and associated server editions worldwide.

ProductAffected VersionsWindows 10All versionsWindows 11All versionsWindows Server 2016All versionsWindows Server 2019All versionsWindows Server 2022All versionsWindows Server 2025All variations

Understanding the Vulnerability

The flaw exists throughout the CBrushRenderingGraphBuilder::AddEffectBrush perform within the DWM core library.

A important part liable for rendering visible results and managing graphics operations.

Attackers who achieve native entry to an affected system can exploit improper buffer dealing with to execute code with elevated privileges.

FieldDetailsCVE IDCVE-2025-55681Vulnerability TypeElevation of Privilege / Out of Bounds Reminiscence AccessComponentdwmcore.dll (Desktop Home windows Supervisor Core Library)Affected FunctionCBrushRenderingGraphBuilder::AddEffectBrushCVSS v3.1 Score7.8 (Excessive)CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

The vulnerability requires no person interplay as soon as preliminary system entry is obtained.

Making it significantly harmful in enterprise environments the place a number of customers share techniques or the place distant entry options are deployed.

Safety researchers demonstrated the vulnerability in the course of the TyphoonPWN Home windows safety competitors, the place it achieved recognition for its exploitation reliability.

The vulnerability carries a CVSS v3.1 rating of seven.8, indicating excessive severity. An authenticated attacker with low-level person privileges can bypass safety controls and achieve unrestricted system entry.

Permitting set up of malware, modification of system configurations, or theft of delicate information. The exploit works most reliably on Home windows 11 techniques however stays practical on Home windows 10.

Although there’s diminished stability attributable to completely different heap reminiscence administration implementations in older Home windows variations. Microsoft has launched safety patches to handle this vulnerability as a part of its common safety updates.

In keeping with SSD-Disclosure studies, organizations ought to apply patches instantly to all affected Home windows techniques. Till patches are deployed, directors ought to prohibit alternatives for native code execution by implementing strict entry controls.

Turning off pointless providers and implementing the precept of least privilege throughout person accounts.

System directors are urged to prioritize deploying this important replace, given the extreme nature of the privilege escalation impression and the low complexity required for exploitation.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Desktop, Escalate, Manager, Microsoft, OutofBounds, Privileges, Vulnerability, Windows

Post navigation

Previous Post: APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
Next Post: Hackers Could Take Control of Car Dashboard by Hacking Its Modem

Related Posts

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers Cyber Security News
Massive Cyber-Attack Attacking macOS Users via GitHub Pages to Deliver Stealer Malware Massive Cyber-Attack Attacking macOS Users via GitHub Pages to Deliver Stealer Malware Cyber Security News
Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks Cyber Security News
Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers Cyber Security News
New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures Cyber Security News
RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark