Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47969: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 11 version 22H2

0
Medium
VulnerabilityCVE-2025-47969cvecve-2025-47969cwe-200
Published: Tue Jun 10 2025 (06/10/2025, 17:02:27 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 version 22H2

Description

Exposure of sensitive information to an unauthorized actor in Windows Hello allows an authorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:14:35 UTC

Technical Analysis

CVE-2025-47969 is a vulnerability identified in Microsoft Windows 11 version 22H2 (build 10.0.22621.0) that involves the exposure of sensitive information through the Windows Hello biometric authentication system. Classified under CWE-200, this vulnerability allows an attacker who already has high-level privileges on the local system to access sensitive data that should otherwise be protected. The flaw does not require user interaction to be exploited but does require the attacker to have elevated privileges, limiting the attack surface to insiders or attackers who have already compromised the system to some extent. The vulnerability does not affect the integrity or availability of the system, focusing solely on confidentiality breaches. Windows Hello is widely used for biometric authentication, and the exposure of sensitive information could include biometric templates or authentication tokens, which could be leveraged for further attacks or identity theft. Although no public exploits are currently known, the vulnerability's presence in a widely deployed OS version makes it a concern for organizations relying on Windows Hello for secure authentication. The CVSS 3.1 vector (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) indicates local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality only. The vulnerability was reserved in May 2025 and published in June 2025, with no patch links available yet, suggesting that remediation may still be pending or in progress.

Potential Impact

The primary impact of CVE-2025-47969 is the unauthorized disclosure of sensitive information related to Windows Hello biometric authentication on affected Windows 11 systems. This exposure can lead to compromise of biometric data or authentication tokens, potentially enabling attackers to bypass authentication mechanisms or impersonate users. Although exploitation requires high privileges and local access, the vulnerability poses a significant risk in environments where insider threats or lateral movement by attackers are concerns. Organizations relying heavily on Windows Hello for secure authentication, such as enterprises with strict access controls or government agencies, could face increased risk of credential theft or identity compromise. The vulnerability does not affect system integrity or availability, so direct disruption is unlikely. However, the confidentiality breach could facilitate further attacks, including privilege escalation or unauthorized access to sensitive resources. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released. Overall, the vulnerability could undermine trust in biometric authentication and necessitate additional security controls or monitoring to detect misuse.

Mitigation Recommendations

To mitigate CVE-2025-47969, organizations should implement the following specific measures: 1) Restrict and monitor administrative and high-privilege accounts to reduce the risk of local attackers gaining the necessary privileges to exploit the vulnerability. 2) Enforce strict physical and logical access controls to prevent unauthorized local access to Windows 11 devices. 3) Enable comprehensive logging and auditing of Windows Hello authentication events and privilege escalations to detect suspicious activity early. 4) Prepare for prompt deployment of official patches from Microsoft once available, including testing in controlled environments to ensure compatibility. 5) Consider temporarily disabling Windows Hello biometric authentication on high-risk systems where local privilege escalation risk is unacceptable until a patch is applied. 6) Employ endpoint detection and response (EDR) solutions to identify anomalous behavior indicative of exploitation attempts. 7) Educate users and administrators about the risks of privilege misuse and the importance of safeguarding credentials and devices. These targeted actions go beyond generic advice by focusing on reducing the attack surface specific to local high-privilege exploitation and protecting biometric authentication data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.465Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f521b0bd07c39389c69

Added to database: 6/10/2025, 6:54:10 PM

Last enriched: 2/21/2026, 9:14:35 PM

Last updated: 3/27/2026, 8:48:01 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses