CVE-2025-62215
Published Nov 11, 2025
Last updated 3 months ago
AI description
CVE-2025-62215 is an elevation-of-privilege vulnerability affecting the Windows Kernel. It stems from a race condition due to improper synchronization when multiple processes concurrently access shared resources. An attacker with local access and some level of system access can exploit this flaw to execute code with elevated privileges, potentially gaining SYSTEM-level access. The vulnerability is triggered by exploiting a race condition in the Windows Kernel's memory management subsystem. By carefully timing multiple threads or processes, an attacker can manipulate shared kernel resources to cause a double-free condition, potentially leading to memory corruption. This allows the attacker to execute arbitrary code in the kernel's context.
- Description
- Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
- Products
- windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_23h2, windows_11_24h2, windows_11_25h2, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025
CVSS 3.1
- Type
- Secondary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Microsoft Windows Race Condition Vulnerability
- Exploit added on
- Nov 12, 2025
- Exploit action due
- Dec 3, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- secure@microsoft.com
- CWE-362
- Hype score
- Not currently trending
Microsoft tackles actively exploited Windows Kernel flaw (CVE-2025-62215) in latest patches. Keep your system secure. #CISO #CyberRiskManagement https://t.co/ybMBkdXHEp
@breachwire_io
26 Jan 2026
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-62215. Windows kernel race. Actively exploited. KEV. Linux 2025: 5.5k+ kernel CVEs. First Rust kernel CVE. Also a race. Timing bugs are everywhere. If your security tool lives in kernel, it inherits them. After CrowdStrike — is kernel really where defense should sit?
@AlexeiBelous
5 Jan 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[1day1line] CVE-2025-62215: LPE Vulnerability in Windows Kernel Due to Race Condition and Double Free https://t.co/mJ8J1VzmxQ Hello, this is Libera. Today's One-Line Update covers an LPE vulnerability discovered in ntoskrnl.exe within the Windows Kernel. The vulnerability arises
@hackyboiz
27 Dec 2025
3756 Impressions
19 Retweets
73 Likes
26 Bookmarks
0 Replies
1 Quote
Just wrote about the critical Windows Kernel EoP CVE-2025-62215 from November MSPT. Local attackers could gain SYSTEM via Race Condition & Double Free. Patch now ⚙️ Waiting for December MSPT today ⏳ #Microsoft #Windows ➡️ https://t.co/o0vgf6Q3PN https://t.co/V7k0Wy6
@leonov_av
9 Dec 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s actively exploited Windows kernel race condition CVE-2025-62215 is now in CISA’s KEV, enabling privilege escalation after initial compromise. NVD entry: https://t.co/sHdHKUV9uD
@InfosecDotWatch
3 Dec 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 #AlertaSOC | CVE-2025-62215 Informamos de nuevas vulnerabilidades que afectan a sistemas Microsoft Windows. #AndalucíaCert Recomendamos revisar la alerta oficial y aplicar las medidas de mitigación indicadas. ℹ️ Más información: https://t.co/2EC110SHXG https://t.co/e
@CentroCiberAND
3 Dec 2025
21 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
A serious flaw CVE-2025-62215 in the Windows Kernel is being actively exploited. It’s a local privilege escalation bug: attackers with limited access can gain SYSTEM-level control. Severity: High (CVSS 7.0) Impact: Full system compromise if exploited after initial foothold.
@ZBounty18591
2 Dec 2025
52 Impressions
0 Retweets
2 Likes
0 Bookmarks
1 Reply
0 Quotes
🔴 CRITICAL: KB5068787 patches 2 zero-days actively exploited in the wild 🛡️ CVE-2025-62215 — Windows Kernel privilege escalation 🛡️ CVE-2025-59287 — WSUS remote code execution (CVSS 9.8) ⏰ WSUS servers: Patch within 24-48 hours 📖 Full deployment guide + st
@ctrlaltnod
29 Nov 2025
100 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/GAfgpM8y6o https://t.co/qvfVu6F1Gk
@IT_Peurico
24 Nov 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Alerta Rodbol – Vulnerabilidad Zero-Day en Windows Se ha detectado una vulnerabilidad de escalación de privilegios, identificada como CVE-2025-62215, en el kernel de Windows que ya está siendo explotada en condiciones reales. 🛡️ ¿Qué significa para tu infraestr
@RODBOLCOL
24 Nov 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WSUS RCE CVE-2025-59287 is under active exploit, with ShadowPad riding via compromised update chains. Kernel LPE CVE-2025-62215 also patched. Patch WSUS and Windows, then maybe breathe. #infosec https://t.co/Bv04pu4qas
@threatcluster
23 Nov 2025
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
After analyzing 92% of vulnerabilities from past week, CVE-2025-62215 has 31 articles published from different internet sources, no other cve has these many articles. More information here: https://t.co/SyyDujjO8C #vulnerability #CyberSecurity #ThreatIntel #CVE #SecurityAlert
@stooee_
22 Nov 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#مايكروسوفت تصدر تحديثًا أمنيًا لـ Windows Kernel لسد ثغرة CVE-2025-62215 خطيرة تُستخدم لرفع صلاحيات محليًا عبر race condition. الرجاء التحديث فورًا. #أمن_معلومات #Windows11 #ثغرا
@belarabinet
22 Nov 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/TBkEIjnVI8 https://t.co/JnjGB0Eba8
@valterpcjr
19 Nov 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
One zero-day’s already being exploited. Over 60 bugs fixed. Microsoft’s November patch is not optional. CVE-2025-62215 can let attackers in the back door. SMBs: update every Windows device now. Don’t wait for the knock. https://t.co/hp128ej8qg #CyberSecurity #PatchNow
@lowcountrycyber
18 Nov 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft's latest security updates patch over 60 vulnerabilities, including a zero-day (vulnerability (CVE-2025-62215)) and a critical flaw (CVE-2025-60274) in a core Windows graphic component, exposing systems to potential exploitation and remote code execution. Defenders
@cybernewslive
17 Nov 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/jrheULEVWo
@endorans43027
17 Nov 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Urgent Microsoft Update: Patch Windows 10, 11, Server Now https://t.co/FWb5550kjG #cve-2025-62215 #PrivilegeEscalation #WindowsKernel
@wizconsults
16 Nov 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-62215 que pega o Microsoft Windows já foi corrigida, mas olha... race condition...timing chato... é tão difícil de explorar que deveria dar um prêmio pra quem conseguir usar!
@hashtagsec
16 Nov 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoftが現在悪用されているWindows カーネ ルのゼロデイ (CVE-2025-62215) をパッチ適用しましたね。まだ更新していない場合はすぐに更新して再起動しましょう。
@inoritodo
15 Nov 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚡️The zero-day vulnerability that has been listed as exploited in Tuesday's update is CVE-2025-62215 (CVSS score: 7.0), a privilege escalation flaw in Windows Kernel. The Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) have been cred
@AnonOzzyDude
14 Nov 2025
159 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
11 Kasım 2025 Patch Tuesday ile Microsoft, Windows Kernel'de bir ayrıcalık yükseltme hatasını (CVE-2025-62215) giderdi. https://t.co/3O2lyDbTyM #microsoft #securityupdate #CyberSecurity https://t.co/Qg5IZuigXr
@adminguide
14 Nov 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft Patch Tuesday corrige 63 falhas — e um zero-day ativo! A atualização de novembro traz correções para vulnerabilidades críticas no Windows, WSLg, componentes gráficos e no Kerberos. ⚠️ Destaques: CVE-2025-62215: falha de race condition no kernel, já ex
@brainworkblog
13 Nov 2025
63 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
1/2 🚨 Patch Tuesday (Nov 2025) highlights: 63 new CVEs, incl: • Windows Kernel EoP zero-day (CVE-2025-62215) • GDI+ RCE (9.8) • Outlook Preview Pane RCE • SQL Server EoP (remote, low-priv creds)
@pinholedawn
13 Nov 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/akalPghHim https://t.co/hR6SrV3loP
@ggrubamn
13 Nov 2025
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/3NXORlseM2 https://t.co/exvYxjh6E4
@ggrubamn
13 Nov 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Heads-up: CVE-2025-62215 = Windows Kernel race-condition + double-free bug → local attacker (already inside) can get SYSTEM privileges. 🔧 Patch immediately. Monitor for post-compromise escalation.
@bountyayush
13 Nov 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft corrige una vulnerabilidad del kernel de Windows que estaba siendo explotada activamente. Lanzan una carga ligera de parches, corrigiendo más de 60 vulnerabilidades, incluida una falla del kernel de Windows (CVE-2025-62215). #ciberseguridad https://t.co/CBs0PIpiRN
@EHCGroup
13 Nov 2025
72 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical #Windows Kernel Vulnerability #CVE-2025-62215: Active Exploitation Detected https://t.co/mP3dK95TVQ
@UndercodeNews
13 Nov 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/TC99NylgUj https://t.co/kMxG5UUsSn
@pcasano
13 Nov 2025
40 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
First Windows 10 post-support update is here. Microsoft calls CVE-2025-62215 the "highest risk" vulnerability. Businesses should buy extended support; home users should upgrade ASAP to avoid risks. #Windows10 #CyberSecurity https://t.co/M3XL3uaF61
@GoodChoiceIT
13 Nov 2025
150 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Upozorňujeme na aktivně zneužívanou zero-day zranitelnost v Microsoft Windows kernel, CVE-2025-62215. Tato zranitelnost vyplývá z problému poškození paměti, který pramení ze „souběžného provádění pomocí sdíleného zdroje s nesprávnou synchronizací („
@GOVCERT_CZ
13 Nov 2025
1089 Impressions
4 Retweets
8 Likes
1 Bookmark
0 Replies
1 Quote
🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/bhh62Ej6nu
@Jack1111262
13 Nov 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CRITICAL PATCH: Microsoft fixes 63 flaws, including a Windows Kernel EoP zero-day (CVE-2025-62215) actively exploited in the wild. Patch immediately! More info in: https://t.co/ZKrqe7jBKc https://t.co/9i7Sm4tc8X
@58Consulting
12 Nov 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
米国サイバーセキュリティ・社会基盤安全保障庁(CISA)が既知の悪用された脆弱性カタログに以下を追加。 - WatchGuard FireboxのCVE-2025-9242 - Gladinet TriofoxのCVE-2025-12480 - WindowsのCVE-2025-62215 対処期限は何れも通常の12/3
@__kokumoto
12 Nov 2025
1877 Impressions
0 Retweets
3 Likes
5 Bookmarks
1 Reply
1 Quote
パッチ火曜日: Microsoft が Windows カーネルの脆弱性 (CVE-2025-62215) を修正 Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215) #HelpNetSecurity (Nov 12) https://t.co/XTtrRPjfH4
@foxbook
12 Nov 2025
337 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft's November Patch Tuesday is here, fixing a Windows Kernel zero-day (CVE-2025-62215) actively exploited for privilege escalation. A critical 9.8 CVSS GDI+ RCE flaw (CVE-2025-60724) also patched. Patch now! ⚠️ #PatchTuesday #CyberSecurity... 🔗 https://t.co/Gb
@NetSecIO
12 Nov 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
برای کرنل ویندوز ، آسیب پذیری جدیدی از نوع privilege escalation با کد شناسایی CVE-2025-62215 منتشر شده است. برای امن سازی به قسمت windows update مراجعه کرده و پچ جدید را نصب کنید.
@EthicalSafe
12 Nov 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft patches actively exploited Windows Kernel zero-day CVE-2025-62215. Immediate update recommended to prevent privilege escalation attacks. Link: https://t.co/x68iTNwe5I #Security #Patch #Windows #Kernel #CVE #Exploit #Update #Software #Vulnerability #Protection #Defense h
@dailytechonx
12 Nov 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ACHTUNG!!! 🚨 1/ ⚠️ Microsoft stopft eine aktiv ausgenutzte Kernel-Lücke (CVE-2025-62215). Wer nicht patcht, riskiert Systemrechte für Angreifer. 🔐 ➡️ Update sofort einspielen (Windows 10/11 & Server) + Neustart. https://t.co/nY1TJ3Qk4b
@derHugoKlartext
12 Nov 2025
87 Impressions
0 Retweets
0 Likes
0 Bookmarks
2 Replies
0 Quotes
The latest Patch Tuesday updates are here, and active exploitation is confirmed for CVE-2025-62215. This is rated Important and should be prioritized for patching. Get the latest on all the other CVEs from the November update here: https://t.co/y1oqIPPD2p #PatchTuesday https://
@fortraofficial
12 Nov 2025
98 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/abs1fzTJXP
@Jonny1599843
12 Nov 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft just fixed a Windows flaw hackers are already exploiting in the wild. The kernel bug (CVE-2025-62215) lets anyone with local access gain full control — and it’s being linked with other attacks for complete takeover. https://t.co/U3GyFQgUPw
@Favor487515
12 Nov 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Cyber alert! Microsoft just patched over 60 vulnerabilities, including one actively exploited. CVE-2025-62215 allows local attackers to escalate privileges. Prioritize updates, especially for RCE bugs! How are you tackling security this month? #Ciberseguridad https://t.co/lCoWLYv
@CyberDailyPost
12 Nov 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft Patch Tuesday - 63 CVEs, Kernel Zero-Day Exploited Microsoft patched 63 vulnerabilities including CVE-2025-62215—an actively exploited Windows kernel elevation-of-privilege zero-day. What's notable: the kernel flaw was being used in the wild before today's pa
@the_c_protocol
12 Nov 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔐🪟 SIGNALS WEEKLY: Keys. Gates. Windows. Actively exploited Win kernel EoP ✅ (CVE-2025-62215). Cisco RA-VPN bugs can reload unpatched edges. LANDFALL used Samsung’s image bug (CVE-2025-21042). Which breaks first in your shop? Read -> https://t.co/JrOdxeJL8a #Alph
@alphahunt_io
12 Nov 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/UkUzm3whU5 https://t.co/oZ2QaDdQlK
@Trej0Jass
12 Nov 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 مایکروسافت Patch Tuesday نوامبر ۲۰۲۵ منتشر کرد: 🔹 63 آسیبپذیری 🔹 یک Zero-Day فعال: CVE-2025-62215 🔹 سوءاستفاده از یک باگ هستهٔ ویندوز و گرفتن دسترسی سیستم 💣 فوری پچ
@vulnerbyte
12 Nov 2025
53 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft’s Nov 2025 Patch Advisory is live! 90+ flaws fixed across Windows, Azure, SQL, SharePoint & more, incl. critical RCEs & an actively exploited Windows Kernel EoP (CVE-2025-62215). 🛡️ Patch now → stay resilient. https://t.co/w9ynaMN7sa #Cybersecurit
@sequretek_sqtk
12 Nov 2025
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) https://t.co/8E6Oh5KFxs https://t.co/Y3nRKbl2pb
@Art_Capella
12 Nov 2025
57 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "16F25469-D606-4A71-9A94-C10E1D08B231",
"versionEndExcluding": "10.0.17763.8027"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "1A6A1513-48D5-4D4D-97F1-BFDAE4DC9396",
"versionEndExcluding": "10.0.17763.8027"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EB5C0945-7EA1-4874-98E7-4234D85E0C0D",
"versionEndExcluding": "10.0.19044.6575"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "655C5458-E6FB-408D-BCB4-0D28F8283D55",
"versionEndExcluding": "10.0.19045.6575"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0752A377-F96A-4B2F-B542-A9A9665AB913",
"versionEndExcluding": "10.0.22631.6199"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4345F25E-DF90-4CB2-B310-F82E08502815",
"versionEndExcluding": "10.0.26100.7092"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5A547AA3-FC6B-46D9-8D22-995C3CA33140",
"versionEndExcluding": "10.0.26200.7092"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "970E52EF-A858-4132-9D8C-4B31E169002C",
"versionEndExcluding": "10.0.17763.8027"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5791ADD5-7D67-4659-9DA2-09337A1D82C1",
"versionEndExcluding": "10.0.20348.4346"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "256174B8-134D-44F5-9497-408AC51DE5DB",
"versionEndExcluding": "10.0.25398.1965"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "69424DAF-E9EA-4B50-80EC-5BAA97DEB772",
"versionEndExcluding": "10.0.26100.7092"
}
],
"operator": "OR"
}
]
}
]