Vulnerability in Microsoft Driver Block List Affecting Windows Systems
CVE-2025-59033

7.4HIGH

Key Information:

Vendor

Microsoft

Status
Vendor
CVE Published:
8 September 2025

What is CVE-2025-59033?

CVE-2025-59033 is a vulnerability found in the Microsoft Driver Block List, which is integrated into Windows systems through Windows Defender Application Control (WDAC). This block list's primary function is to prevent the installation or execution of unauthorized drivers, thereby enhancing the security of the system. The vulnerability arises when hypervisor-protected code integrity (HVCI) is not enabled on a Windows device. In such cases, while certain entries in the block list are effectively blocked, those specifying only the to-be-signed part of the code signing certificate may evade detection if the entries include a TBS hash and a 'FileAttribRef' qualifier, like the file name or version. Organizations that fail to deploy HVCI on their Windows systems are left exposed to the risk of malicious drivers being allowed to run, potentially leading to various security breaches and exploitations.

Potential impact of CVE-2025-59033

  1. Increased Malicious Code Execution: The vulnerability could allow attackers to install unauthorized drivers, potentially enabling them to execute malicious code undetected. This could lead to data exfiltration, system compromise, or even a full takeover of the affected systems.

  2. Widespread System Vulnerability: Given that the vulnerability impacts any Windows system without HVCI enabled, a large number of systems may be at risk. This creates a significant attack surface that malicious actors can exploit, which could lead to widespread security incidents across organizations.

  3. Regulatory Non-Compliance: Organizations that fail to address this vulnerability may find themselves in violation of compliance regulations that require stringent protection against unauthorized software. This could result in legal ramifications and damage to organizational reputation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Windows 10

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.