mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
215 lines
7.8 KiB
JSON
215 lines
7.8 KiB
JSON
{
|
|
"id": "CVE-2025-24985",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2025-03-11T17:16:34.303",
|
|
"lastModified": "2025-03-14T20:35:43.050",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El desbordamiento de enteros o el envoltura en el controlador Fast FAT de Windows permite que un atacante no autorizado ejecute c\u00f3digo localmente."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "secure@microsoft.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"cisaExploitAdd": "2025-03-11",
|
|
"cisaActionDue": "2025-04-01",
|
|
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
"cisaVulnerabilityName": "Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability",
|
|
"weaknesses": [
|
|
{
|
|
"source": "secure@microsoft.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-122"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-190"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-190"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.10240.20947",
|
|
"matchCriteriaId": "6997DE6E-CBAD-4690-A68C-8F10E477DCC2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
|
"versionEndExcluding": "10.0.10240.20947",
|
|
"matchCriteriaId": "3CBCF6D9-5085-473C-82F5-98BC246A9C4C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.14393.7876",
|
|
"matchCriteriaId": "0CF0E174-4692-4AA3-B72E-12E73A1BDBE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
|
"versionEndExcluding": "10.0.14393.7876",
|
|
"matchCriteriaId": "340EF5F8-D4F5-4AD8-9D80-1DEC2F376BE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.17763.7009",
|
|
"matchCriteriaId": "67C8DCD7-90C4-431F-BD03-FDFDE170E748"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
|
"versionEndExcluding": "10.0.17763.7009",
|
|
"matchCriteriaId": "05169574-28AB-4E42-B3DE-710574BB1AD3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.19044.5608",
|
|
"matchCriteriaId": "83256070-991F-404C-AE4C-CBB46166CA67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.19045.5608",
|
|
"matchCriteriaId": "A1F779E2-8536-4B06-A151-6115C9D88D29"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.22621.5039",
|
|
"matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.22631.5039",
|
|
"matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.26100.3476",
|
|
"matchCriteriaId": "749B3071-291A-456E-90D5-4B0061B40064"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
|
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
|
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
|
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.14393.7876",
|
|
"matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.17763.7009",
|
|
"matchCriteriaId": "D271422D-A29F-4DBF-BF72-BCD90E393A5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.20348.3328",
|
|
"matchCriteriaId": "C1426FF0-A402-4149-9F2B-0FA3CEB4BB5B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.25398.1486",
|
|
"matchCriteriaId": "96046A7B-76A1-4DCF-AEA5-25344D37E492"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.26100.3476",
|
|
"matchCriteriaId": "DFE44B43-DB8C-46E0-8344-C22ED7406A50"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |