Use After Free Vulnerability in Windows LDAP by Microsoft
CVE-2025-26670
8.1HIGH
Key Information:
- Vendor
- Microsoft
- Status
- Vendor
- CVE Published:
- 8 April 2025
Summary
A use after free vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can allow unauthorized attackers to execute arbitrary code remotely. This security breach is facilitated by improper handling of memory, leading to potential exploitation by malicious actors over a network. Administrators are urged to apply the latest patches to mitigate risks associated with this vulnerability.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20978
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7970
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.7137
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved