CVE Alert: CVE-2025-55339 – Microsoft – Windows 11 Version 25H2

CVE-2025-55339

HIGHNo exploitation known

Out-of-bounds read in Windows NDIS allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 11 Version 25H2, Windows Server 2022, Windows 11 version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025
Versions
10.0.26200.0 lt 10.0.26200.6899 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899
CWE
CWE-125, CWE-125: Out-of-bounds Read
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-10-14T17:00:16.751Z
Updated
2025-10-14T23:55:10.663Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation on affected Windows endpoints; patching should be applied as soon as feasible.

Why this matters

Exploitation yields SYSTEM-level access with broad impact to confidentiality, integrity and availability. With widespread versions affected across client and server editions, an attacker’s foothold could quickly lead to post-exploitation capabilities, data exposure or service disruption on endpoints and slim server surfaces.

Most likely attack path

  • Preconditions: attacker must have local access and the ability to load or interact with a vulnerable NDIS driver; low complexity and no user interaction are required.
  • Path: attacker triggers the out-of-bounds read in the NDIS driver to elevate privileges, then moves to persistence or broader control from the compromised host.
  • Lateral movement potential is limited by the local-vector nature, but SYSTEM-level access enables dense opportunities for data exfiltration or compromise of connected assets.

Who is most exposed

Enterprises with widespread Windows 11/Server deployments (including newer 22H2/23H2/24H2 variants and Server Core), particularly on endpoints and servers lacking current patches or robust driver/endpoint controls.

Detection ideas

  • Sudden kernel-mode crashes or memory corruption events (BugCheck) linked to networking/NDIS.
  • Unexpected loading or unsigned NDIS network drivers or driver-signature policy bypass events.
  • Privilege-escalation related process creations or new services with high integrity jumps.
  • Unusual spikes in memory access patterns within the network driver stack.
  • Security logs showing elevated privileges without corresponding user actions.

Mitigation and prioritisation

  • Apply the vendor patch to all affected OS builds (latest cumulative updates); verify deployment via patch management.
  • Enable memory integrity and driver-signing controls; restrict local driver installation.
  • Minimise local admin access; implement just-in-time/just-enough privilege (JIT/Je) and endpoint detection for unusual kernel activity.
  • Ensure robust EDR/MDI coverage and rapid containment playbooks; test patches in a controlled environment before wide rollout.
  • If KEV or EPSS data becomes available and indicates elevated exploit likelihood, treat as priority 1.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features