Security Feature Bypass in Windows Virtualization-Based Security by Microsoft
CVE-2025-27735
6MEDIUM
Key Information:
- Vendor
- Microsoft
- Status
- Vendor
- CVE Published:
- 8 April 2025
Summary
An insufficiency in the verification of data authenticity within the Windows Virtualization-Based Security (VBS) Enclave can be exploited by authorized attackers, allowing them to bypass critical security features locally. This vulnerability poses significant risks as it can potentially undermine the protective measures implemented within VBS, thus impacting the overall integrity of the system's security framework.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20978
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7970
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.7137
References
CVSS V3.1
Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved