-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
NVD Vulnerability Details :
CVE-2025-21334
Analyzed
More Info
Official Page
Source
-
secure@microsoft.com
View Known Exploited Vulnerability (KEV) details
Published At
-
14 Jan, 2025 | 18:15
Updated At
-
27 Oct, 2025 | 17:13
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CISA Catalog
Date Added
Due Date
Vulnerability Name
Required Action
2025-01-14
2025-02-04
Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Date Added:
2025-01-14
Due Date:
2025-02-04
Vulnerability Name:
Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability
Required Action:
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Metrics
Type
Version
Base score
Base severity
Vector
Secondary
3.1
7.8
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type:
Secondary
Version:
3.1
Base score:
7.8
Base severity:
HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches
Microsoft Corporation
microsoft
>>
windows_10_21h2
>>
Versions before 10.0.19044.5371(exclusive)
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>
windows_10_22h2
>>
Versions before 10.0.19045.5371(exclusive)
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>
windows_11_22h2
>>
Versions before 10.0.22621.4751(exclusive)
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*
Microsoft Corporation
microsoft
>>
windows_11_22h2
>>
Versions before 10.0.22621.4751(exclusive)
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>
windows_11_23h2
>>
Versions before 10.0.22631.4751(exclusive)
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*
Microsoft Corporation
microsoft
>>
windows_11_23h2
>>
Versions before 10.0.22631.4751(exclusive)
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>
windows_11_24h2
>>
Versions before 10.0.26100.2894(exclusive)
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*
Microsoft Corporation
microsoft
>>
windows_11_24h2
>>
Versions before 10.0.26100.2894(exclusive)
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>
windows_server_2022_23h2
>>
Versions before 10.0.25398.1369(exclusive)
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
windows_server_2025
>>
Versions before 10.0.26100.2894(exclusive)
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Load More
Weaknesses
CWE ID
Type
Source
CWE-416
Secondary
secure@microsoft.com
CWE ID:
CWE-416
Type:
Secondary
Source:
secure@microsoft.com
Evaluator Description
Evaluator Impact
Evaluator Solution
Vendor Statements
References
Hyperlink
Source
Resource
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334
secure@microsoft.com
Patch
Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-21334
134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
Hyperlink:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334
Source:
secure@microsoft.com
Resource:
Patch
Vendor Advisory
Hyperlink:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-21334
Source:
134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
US Government Resource
Change History
0
Changes found
Details not found