CVE-2025-33053
Published Jun 10, 2025
Last updated 2 days ago
AI description
CVE-2025-33053 is a remote code execution vulnerability affecting the WebDAV client in Microsoft Windows. It stems from insufficient input validation in WebDAV file path handling, allowing an attacker to execute arbitrary code over a network. Successful exploitation requires a user to click on a specially crafted WebDAV URL, potentially leading to unauthorized access to sensitive system resources, compromise of system integrity and confidentiality, or even full control of the affected system. This vulnerability has been actively exploited in the wild.
- Description
- External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Web Distributed Authoring and Versioning (WebDAV) External Control of File Name or Path Vulnerability
- Exploit added on
- Jun 10, 2025
- Exploit action due
- Jul 1, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- secure@microsoft.com
- CWE-73
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
25
Stealth Falcon exploits Zero-Day Vulnerability CVE-2025-33053 https://t.co/emWelqJBra https://t.co/wMFvn1YmAc
@CloudVirtues
13 Jun 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-33053 is a wake-up call: cyber tools from targeted Middle Eastern espionage efforts are out there. Ensure your systems are up-to-date! 🔒 #cybersecurity #infosec #threats https://t.co/wL8IlDtlhb
@labrat_io
13 Jun 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 About CVE-2025-33053 - a crazy Windows execution flow vulnerability This flaw abuses how Windows resolves executable paths when trusted binaries spawn child processes without full paths. For example, a legitimate tool like iediagcmd.exe is launched from a .url file that
@nextronresearch
13 Jun 2025
7277 Impressions
47 Retweets
119 Likes
58 Bookmarks
0 Replies
2 Quotes
🚨 About CVE-2025-33053 - a crazy Windows execution flow vulnerability This flaw abuses how Windows resolves executable paths when trusted binaries spawn child processes without full paths. For example, a legitimate tool like iediagcmd.exe is launched from a .url file that
@nextronresearch
13 Jun 2025
1 Impression
2 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-33053
@transilienceai
13 Jun 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
URGENT: Critical Windows Vulnerability (CVE-2025-33053) Exposes Users to Hackers
@CyberDynSteve
13 Jun 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zero-Day. Nation-State Espionage. Check Point Research discovered that Stealth Falcon exploited a new Microsoft vulnerability (CVE-2025-33053) to target a defense org. Read the full report: https://t.co/MdMDDk0zah #CyberSecurity #ZeroDay #ThreatIntel https://t.co/MdMDDk0zah
@MDST9999
13 Jun 2025
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Stealth Falcon exploits Zero-Day Vulnerability CVE-2025-33053 https://t.co/MoPUhxPEGZ https://t.co/d14ZPLZiwI
@SirajD_Official
13 Jun 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 URGENT: Critical Windows Vulnerability (CVE-2025-33053) Exposes Users to Hackers 🚨 A severe security flaw in Windows' WebDAV technology allows attackers to take control of computers with just one click on a malicious link. https://t.co/pP96Rphaic
@pcpitstopaus
13 Jun 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-33053
@transilienceai
12 Jun 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2025-33053 Web Distributed Authoring and Versioning (WebDAV) External Control of File Name or Path Vulnerability https://t.co/0fH0RO7ELp
@ScyScan
12 Jun 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Stealth Falcon exploits Zero-Day Vulnerability CVE-2025-33053 https://t.co/D8G0cHJlIw https://t.co/MuQ5nXtcRJ
@scandaletti
12 Jun 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft Fixes Zero-Day Exploited for Cyber Espionage (CVE-2025-33053) In the most recent June 2025 Patch Tuesday, software giant Microsoft has disc https://t.co/Ax30yZ8Cqh https://t.co/WVYYxWxw4O
@AegisLens
12 Jun 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053) https://t.co/LzMXW4AskG https://t.co/TUd1lGAO0E
@TechMash365
12 Jun 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft just patched CVE-2025-33053 a high-severity (CVSS 8.8) WebDAV vulnerability. Despite not being marked "critical," it's actively exploited in the wild — and even legacy Windows systems received a fix. 🔒 Update now to stay protected: https://t.co/42QNx35msG https:
@KasperskyKSA
12 Jun 2025
200 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-33053: External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network. https://t.co/iB4NSKFCKb https://t.co/ttcEiJiTna
@cyber_advising
12 Jun 2025
1461 Impressions
9 Retweets
16 Likes
10 Bookmarks
1 Reply
0 Quotes
⚠️Actualizaciones de seguridad de junio de Microsoft ❗CVE-2025-33053 ❗CVE-2025-33073 ❗CVE-2025-32717 ❗CVE-2025-29828 ➡️Más info: https://t.co/GkinGPK48t https://t.co/YP7m2cOCO8
@CERTpy
12 Jun 2025
174 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage https://t.co/mzYDULuVPn #CyberSecurity #Espionage
@xcybersecnews
12 Jun 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hackers exploited Windows WebDav zero-day to drop malware APT group Stealth Falcon exploited a Windows WebDAV RCE zero-day (CVE-2025-33053) in targeted espionage attacks since March 2025, focusing on defense and government entities in Turkey, Qatar, Egypt, and Yemen. The flaw ht
@dCypherIO
12 Jun 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 #Microsoft #Windows, WebDAV Path Traversal, #CVE-2025-33053 (Critical) https://t.co/c3hNVbRKfr
@dailycve
12 Jun 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Detect CVE-2025-33053 exploitation–zero-day RCE vulnerability in WebDAV used in Stealth Falcon APT attacks– with a set of Sigma rules in the SOC Prime Platform. https://t.co/p2jJBQZmEO
@SOC_Prime
12 Jun 2025
150 Impressions
1 Retweet
6 Likes
1 Bookmark
0 Replies
0 Quotes
🦅 Stealth Falcon’s CVE-2025-33053 = Father’s Day chaos 🔥 Patch fast 👉 https://t.co/1TVADQohRx #AlphaHunt #AskYourTIP #ZeroDay #StealthFalcon #OilRig https://t.co/TGgDTKi5wg
@alphahunt_io
12 Jun 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub - DevBuiHieu/CVE-2025-33053-Proof-Of-Concept - https://t.co/w6u7iESmiR
@piedpiper1616
12 Jun 2025
1245 Impressions
10 Retweets
20 Likes
7 Bookmarks
0 Replies
0 Quotes
Microsoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053) https://t.co/dfct8cIWIo https://t.co/V1z94w5XnU
@secured_cyber
12 Jun 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🗞️ Stealth Falcon hackers exploited a Windows WebDAV zero-day (CVE-2025-33053) to deploy Horus malware in espionage attacks targeting defense and government entities in the Middle East and Africa. The flaw was patched in June 2025's Patch Tuesday. Update now! Key takeaways:
@gossy_84
12 Jun 2025
88 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
#DFIR #Malware_analysis 1. Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware https://t.co/aqWTgSmOu1 2. Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability (CVE-2025-33053) https://t.co/ag66y11dIz
@akaclandestine
12 Jun 2025
669 Impressions
0 Retweets
5 Likes
3 Bookmarks
0 Replies
0 Quotes
ハッカーがWindows WebDavのゼロデイ脆弱性を悪用しマルウェアを配布(CVE-2025-33053) https://t.co/w87nczjYym #Security #セキュリティ #ニュース
@SecureShield_
12 Jun 2025
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft patches zero-day (CVE-2025-33053) exploited by Stealth Falcon for cyber-espionage via disguised .url file. June 2025 Patch Tuesday: 66 vulnerabilities fixed. Update your systems! https://t.co/z256DHtDzG #Cybersecurity #PatchTuesday
@_F2po_
12 Jun 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Threat Campaign: Stealth Falcon Exploits Windows WebDAV Zero-Day (CVE-2025-33053) to Deploy Horus Agent Targeting Middle Eastern Defense and Government Sectors🚨 Summary: Stealth Falcon (aka FruityArmor) exploited a Windows WebDAV zero-day (CVE-2025-33053) via weaponized
@CyberxtronTech
12 Jun 2025
82 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-33053
@transilienceai
12 Jun 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Microsoft 月例 パッチ公開 ゼロデイ脆弱性 CVE-2025-33053 に注意喚起、修正件数は66件に #セキュリティ対策Lab #セキュリティ #Security https://t.co/WUzvXKq4r7
@securityLab_jp
12 Jun 2025
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Rest easy, it’s fixed. Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053). https://t.co/z9QIknOn3P #CyberSecurity #cyberespionage
@Robert4787
11 Jun 2025
255 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
'Stealth Falcon' exploited Windows WebDav RCE vulnerability CVE-2025-33053 in zero-day attacks against Turkey, Qatar, Egypt, and Yemen's defense and government organizations, manipulating working directories to execute remote code without local malicious files. #Security https://
@Strivehawk
11 Jun 2025
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s June 2025 Patch Tuesday fixes 68 vulnerabilities, including a zero-day (CVE-2025-33053) exploited by Stealth Falcon via WebDAV. Nine high-risk flaws also addressed across Windows & Office. Stay protected! 🛡️ #CyberUpdate #Microsoft https://t.co/nWpFzUZKvb
@TweetThreatNews
11 Jun 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Stealth Falcon exploited a zero-day Windows WebDav RCE (CVE-2025-33053) to target Middle Eastern defense and government agencies. Malicious .url files enabled remote code execution, deploying Horus Loader & Horus Agent. 🔍 #CyberEspionage #MiddleEast https://t.co/tfRMYTgBD7
@TweetThreatNews
11 Jun 2025
86 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#KDaily@kaspersky CVE-2025-33053: хороший повод обновить Windows Привет от Internet Explorer: уязвимость в расширении протокола HTTP позволяет злоумышленникам запустить вредоносны
@kmscom6
11 Jun 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#KDaily@kaspersky CVE-2025-33053: хороший повод обновить Windows Привет от Internet Explorer: уязвимость в расширении протокола HTTP позволяет злоумышленникам запустить вредоносны
@kmscom3
11 Jun 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
☠️CVE-2025-33053 Zero-Day Detection Updated detection for CVE-2025-33053 where it will detect across your fleet of MDE devices irregardless of the .url file point of entry into your enterprise environment.🫡 https://t.co/jONcfy9Wjc https://t.co/2g8KmOK46k https://t.co/Tc2
@0x534c
11 Jun 2025
6773 Impressions
17 Retweets
117 Likes
110 Bookmarks
1 Reply
0 Quotes
#DFIR #Malware_analysis 1. Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware https://t.co/0Khg25WUUb 2. Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability (CVE-2025-33053) https://t.co/owTRWsgkU2
@ksg93rd
11 Jun 2025
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 Microsoft fixes a critical WebDAV RCE bug (CVE-2025-33053) exploited by Stealth Falcon. Attackers used legit tools + phishing to infect defense targets. Patch ASAP. #ZeroDay #Microsoft #Darkweb #Deepweb Breaking news from the world & Darkweb: https://t.co/ZF7G3lwjoe htt
@godeepweb
11 Jun 2025
67 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Patch Tuesday Microsoft : 66 vulnérabilités corrigées, dont 2 zéro-days CVE-2025-33053 (WebDAV) et CVE-2025-33073 (SMB). https://t.co/rjXRImWuLP
@cert_ist
11 Jun 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-33073 (CVSS 8.8): Windows SMB Client Elevation of Privilege Vulnerability which could allow an attacker to gain SYSTEM privileges on vulnerable devices. - CVE-2025-33053 has been added to CISA’s KEV Catalog indicating reliable reports of active exploitation.
@huseyin_y13238
11 Jun 2025
1 Impression
1 Retweet
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Microsoft's June 2025 Patch Tuesday tackled 66 vulnerabilities, including a critical zero-day exploit, CVE-2025-33053, actively used by the Stealth Falcon espionage group. This WebDAV flaw enabled remote code execution, targeting a defense company in Turkey. Up to 80% of https://
@tony3266
11 Jun 2025
115 Impressions
0 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053) https://t.co/SmyEmFiLDL https://t.co/wSrkTmXCKZ
@ggrubamn
11 Jun 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Быстро обновляемся: вторничным патчем компания Microsoft закрыла неприятный «сюрприз» (наследие Internet Explorer): уязвимость в расширении протокола HTTP позволяет
@Kaspersky_ru
11 Jun 2025
177 Impressions
3 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CVE-2025-33053 : Stealth Falcon and Horus - A Saga of Middle Eastern Cyber Espionage https://t.co/DYQo1wTG5H https://t.co/LUihCdTjDe
@freedomhack101
11 Jun 2025
24 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Microsoft June 2025 Patch Tuesday fixes exploited zero-day Microsoft’s June 2025 Patch Tuesday addresses 66 vulnerabilities, including one actively exploited (CVE-2025-33053, a WEBDAV RCE flaw used by APT group Stealth Falcon) and one publicly disclosed zero-day (CVE-2025-3307
@dCypherIO
11 Jun 2025
101 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053) https://t.co/Nyrv2lfx5t #HelpNetSecurity #Cybersecurity https://t.co/dEPbq6u1T8
@PoseidonTPA
11 Jun 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053) https://t.co/HqBYKBvdq0 https://t.co/ZM81ZqgJuj
@Trej0Jass
11 Jun 2025
47 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Check Point Research discovered a new campaign conducted by the APT group Stealth Falcon. The attack used a .url file that exploited a zero-day vulnerability (CVE-2025-33053) to execute malware from an actor-controlled WebDAV server. https://t.co/VpVDtm35N0 https://t.co/NUxp279EV
@virusbtn
11 Jun 2025
2960 Impressions
15 Retweets
52 Likes
22 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86",
"versionEndExcluding": "10.0.10240.21034"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471",
"versionEndExcluding": "10.0.10240.21034"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46",
"versionEndExcluding": "10.0.14393.8148"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3",
"versionEndExcluding": "10.0.14393.8148"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6",
"versionEndExcluding": "10.0.17763.7434"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89",
"versionEndExcluding": "10.0.17763.7434"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "5FA5B611-90EC-4193-A474-96EDB55A96A4",
"versionEndExcluding": "10.0.19044.5965"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "7701107A-E092-4A9B-B9C6-EAB80E361FA7",
"versionEndExcluding": "10.0.19044.5965"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "B85A61A0-B9ED-4011-9606-66C506076E4E",
"versionEndExcluding": "10.0.19044.5965"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "02C5B4FB-7681-435F-A93F-B9D822165CB5",
"versionEndExcluding": "10.0.19045.5965"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "7DD81C00-6C67-4D4A-9A3B-9BCD9AD4157F",
"versionEndExcluding": "10.0.19045.5965"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "FA4ADE3C-2E1D-4CD9-8FC1-D2D061D4CDE2",
"versionEndExcluding": "10.0.19045.5965"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "80E9DC0B-FA82-4A9A-8F40-193AB9527A89",
"versionEndExcluding": "10.0.22621.5472"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "B8108CE7-3EF2-4A2C-9A88-672615563A92",
"versionEndExcluding": "10.0.22621.5472"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "A12EA244-1390-49C8-B384-039D86779F44",
"versionEndExcluding": "10.0.22631.5472"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "99251B3D-CB95-462F-8D92-31FCC1869565",
"versionEndExcluding": "10.0.22631.5472"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "76A15955-21E1-489C-868F-8BE0BAEF829B",
"versionEndExcluding": "10.0.26100.4349"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "DDE60590-ECC9-4F96-95E1-8FFBF4870A28",
"versionEndExcluding": "10.0.26100.4349"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18",
"versionEndExcluding": "10.0.14393.8148"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F",
"versionEndExcluding": "10.0.17763.7434"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F542F853-E04A-45A6-AE08-DCF9A3A3B1BF",
"versionEndExcluding": "10.0.20348.3807"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "665E7816-E1F2-479C-9E02-82B7FF389D8E",
"versionEndExcluding": "10.0.25398.1665"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "C28BF26E-547E-4CC5-8F0A-29D6419F1053",
"versionEndExcluding": "10.0.26100.4349"
}
],
"operator": "OR"
}
]
}
]