Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21370: CWE-20: Improper Input Validation in Microsoft Windows 11 version 22H2

0
High
VulnerabilityCVE-2025-21370cvecve-2025-21370cwe-20
Published: Tue Jan 14 2025 (01/14/2025, 18:04:44 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 version 22H2

Description

Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:29:35 UTC

Technical Analysis

CVE-2025-21370 is a vulnerability identified in Microsoft Windows 11 version 22H2 (build 10.0.22621.0) affecting the Virtualization-Based Security (VBS) enclave component. The root cause is improper input validation (CWE-20), which allows a local attacker with limited privileges (PR:L) to escalate their privileges to higher levels within the system. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), meaning exploitation is feasible without specialized conditions. The scope is unchanged (S:U), indicating the vulnerability affects resources within the same security scope. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker could gain full control over the enclave and potentially the host system. VBS enclaves are designed to protect sensitive processes and data by isolating them using hardware virtualization features, so compromising this component undermines a critical security boundary. Although no exploits are currently known in the wild, the vulnerability's characteristics suggest it could be leveraged for significant privilege escalation attacks. The vulnerability was reserved in December 2024 and published in January 2025, with no patch links currently available, indicating that mitigation efforts are likely underway but not yet released. Organizations using Windows 11 22H2 with VBS enabled should consider this a high priority for security review and patching once updates are available.

Potential Impact

For European organizations, the impact of CVE-2025-21370 is substantial, especially for those relying on Windows 11 22H2 with VBS enabled to protect sensitive workloads, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators. Successful exploitation could lead to unauthorized access to highly protected environments, data breaches, and disruption of critical services. The elevation of privilege could allow attackers to bypass security controls, deploy malware with high privileges, and maintain persistence. This undermines trust in endpoint security and could lead to regulatory compliance issues under GDPR and other data protection laws. The lack of user interaction requirement increases the risk of automated or stealthy attacks within compromised internal networks. The vulnerability also poses risks to cloud service providers and managed service providers operating Windows 11 endpoints in Europe, potentially affecting a broad range of customers.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely for the release of official patches addressing CVE-2025-21370 and apply them immediately upon availability. 2. Until patches are available, consider disabling or restricting the use of VBS enclaves if feasible, especially on systems not requiring this feature. 3. Implement strict access controls and least privilege principles to limit local user permissions and reduce the attack surface. 4. Employ endpoint detection and response (EDR) solutions capable of monitoring unusual privilege escalation attempts and VBS-related anomalies. 5. Conduct thorough audits of systems running Windows 11 22H2 to identify and isolate vulnerable endpoints. 6. Use network segmentation to limit lateral movement opportunities for attackers exploiting this vulnerability. 7. Educate IT staff about the vulnerability specifics to enhance incident response readiness. 8. Review and harden virtualization and security configurations related to VBS to minimize exploitation vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.361Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd539ed239a66badec3e

Added to database: 9/9/2025, 11:50:43 PM

Last enriched: 2/14/2026, 8:29:35 AM

Last updated: 3/23/2026, 10:42:38 AM

Views: 167

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses