CVE-2025-26651: CWE-749: Exposed Dangerous Method or Function in Microsoft Windows 11 version 22H2
Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-26651 is a vulnerability identified in the Windows Local Session Manager (LSM) component of Microsoft Windows 11 version 22H2 (build 10.0.22621.0). The flaw is categorized under CWE-749, which refers to the exposure of dangerous methods or functions that can be exploited. Specifically, this vulnerability allows an authorized attacker with network access and low privileges to invoke a dangerous method or function within LSM, leading to a denial of service (DoS) condition. The attack does not require user interaction and can be executed remotely over the network, making it relatively easy to exploit. The vulnerability affects the availability of the system but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C) shows that the attack vector is network-based, requires low privileges, no user interaction, and impacts availability. Currently, there are no known exploits in the wild, and no patches have been published yet. The vulnerability was reserved in February 2025 and published in April 2025. The lack of patches means organizations must rely on mitigation strategies until an official fix is released.
Potential Impact
The primary impact of CVE-2025-26651 is the potential for denial of service attacks against systems running Windows 11 version 22H2. For European organizations, this could translate into temporary service outages, disruption of business operations, and potential downtime of critical systems relying on Windows 11. Since the vulnerability requires only low privileges and network access, attackers within the network or with limited access could exploit it to disrupt availability. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure where system availability is crucial. Although confidentiality and integrity are not affected, the loss of availability can still cause significant operational and reputational damage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known. European organizations with extensive Windows 11 deployments, especially those with remote or distributed network architectures, face higher exposure.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply patches immediately once they are released for this vulnerability. 2. Until patches are available, restrict network access to the Local Session Manager service by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 3. Employ network intrusion detection and prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting LSM. 4. Enforce the principle of least privilege to ensure users and services have only the necessary permissions, reducing the risk of exploitation by low-privilege attackers. 5. Conduct regular vulnerability assessments and penetration testing focusing on Windows 11 systems to identify potential exposure. 6. Implement robust incident response plans to quickly address any denial of service events. 7. Educate IT staff about this vulnerability and the importance of timely patching and network controls. 8. Consider temporary disabling or restricting LSM-related services if feasible and if it does not impact critical operations until a patch is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-26651: CWE-749: Exposed Dangerous Method or Function in Microsoft Windows 11 version 22H2
Description
Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-26651 is a vulnerability identified in the Windows Local Session Manager (LSM) component of Microsoft Windows 11 version 22H2 (build 10.0.22621.0). The flaw is categorized under CWE-749, which refers to the exposure of dangerous methods or functions that can be exploited. Specifically, this vulnerability allows an authorized attacker with network access and low privileges to invoke a dangerous method or function within LSM, leading to a denial of service (DoS) condition. The attack does not require user interaction and can be executed remotely over the network, making it relatively easy to exploit. The vulnerability affects the availability of the system but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C) shows that the attack vector is network-based, requires low privileges, no user interaction, and impacts availability. Currently, there are no known exploits in the wild, and no patches have been published yet. The vulnerability was reserved in February 2025 and published in April 2025. The lack of patches means organizations must rely on mitigation strategies until an official fix is released.
Potential Impact
The primary impact of CVE-2025-26651 is the potential for denial of service attacks against systems running Windows 11 version 22H2. For European organizations, this could translate into temporary service outages, disruption of business operations, and potential downtime of critical systems relying on Windows 11. Since the vulnerability requires only low privileges and network access, attackers within the network or with limited access could exploit it to disrupt availability. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure where system availability is crucial. Although confidentiality and integrity are not affected, the loss of availability can still cause significant operational and reputational damage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known. European organizations with extensive Windows 11 deployments, especially those with remote or distributed network architectures, face higher exposure.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply patches immediately once they are released for this vulnerability. 2. Until patches are available, restrict network access to the Local Session Manager service by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 3. Employ network intrusion detection and prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting LSM. 4. Enforce the principle of least privilege to ensure users and services have only the necessary permissions, reducing the risk of exploitation by low-privilege attackers. 5. Conduct regular vulnerability assessments and penetration testing focusing on Windows 11 systems to identify potential exposure. 6. Implement robust incident response plans to quickly address any denial of service events. 7. Educate IT staff about this vulnerability and the importance of timely patching and network controls. 8. Consider temporary disabling or restricting LSM-related services if feasible and if it does not impact critical operations until a patch is available.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T19:23:29.270Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb36
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/14/2026, 9:10:07 AM
Last updated: 3/24/2026, 10:11:19 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.