Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53717: CWE-807: Reliance on Untrusted Inputs in a Security Decision in Microsoft Windows 11 version 22H2

0
High
VulnerabilityCVE-2025-53717cvecve-2025-53717cwe-807
Published: Tue Oct 14 2025 (10/14/2025, 17:00:54 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 version 22H2

Description

Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 23:48:08 UTC

Technical Analysis

CVE-2025-53717 is a vulnerability classified under CWE-807, indicating reliance on untrusted inputs in a security decision. It affects the Windows Virtualization-Based Security (VBS) Enclave in Windows 11 version 22H2 (build 10.0.22621.0). The VBS Enclave is a security feature designed to isolate sensitive processes and data from the rest of the operating system using hardware virtualization. The vulnerability allows an authorized local attacker to manipulate untrusted inputs that influence security decisions within the enclave, potentially bypassing intended protections. This can lead to privilege escalation, granting the attacker higher system privileges than originally authorized. The CVSS v3.1 base score is 7.0 (high), reflecting local attack vector (AV:L), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are known, and no patches have been linked yet, indicating that mitigation currently relies on access control and monitoring. The vulnerability was reserved in July 2025 and published in October 2025, suggesting recent discovery and disclosure.

Potential Impact

The vulnerability poses a significant risk to organizations running Windows 11 version 22H2, especially those relying on VBS for enhanced security. Successful exploitation can lead to local privilege escalation, allowing attackers to gain administrative control, bypass security controls, and potentially deploy further malware or conduct lateral movement. This compromises system confidentiality, integrity, and availability, potentially leading to data breaches, system downtime, or persistent footholds within critical infrastructure. Enterprises with sensitive data or regulatory compliance requirements are particularly at risk. Since exploitation requires local access, insider threats or attackers who have already gained limited access could leverage this vulnerability to escalate privileges. The absence of known exploits reduces immediate risk but also means organizations should act proactively to prevent future exploitation.

Mitigation Recommendations

Until official patches are released, organizations should enforce strict local access controls, limiting user privileges and restricting physical or remote local access to trusted personnel only. Employ robust endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or suspicious activity within the VBS environment. Regularly audit user accounts and permissions to minimize the number of users with local access rights. Disable or limit the use of VBS enclaves where feasible if the risk outweighs the benefits temporarily. Maintain up-to-date backups and prepare incident response plans for potential exploitation scenarios. Once Microsoft releases patches, prioritize immediate deployment after testing in controlled environments. Additionally, consider applying application whitelisting and enhanced logging to detect exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T03:10:34.735Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85833dd1bfb0b7e3e670

Added to database: 10/14/2025, 5:16:51 PM

Last enriched: 3/1/2026, 11:48:08 PM

Last updated: 3/22/2026, 9:32:27 AM

Views: 279

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses