Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55334: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-55334cvecve-2025-55334cwe-312
Published: Tue Oct 14 2025 (10/14/2025, 17:01:03 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:25:18 UTC

Technical Analysis

CVE-2025-55334 is a vulnerability identified in Microsoft Windows 11 Version 25H2 (build 10.0.26200.0) characterized by the cleartext storage of sensitive information within the Windows Kernel. This vulnerability is classified under CWE-312, indicating improper protection of sensitive data at rest. The flaw enables an unauthorized local attacker, who does not require privileges or user interaction, to bypass certain security features by accessing sensitive information stored in cleartext. The vulnerability has a CVSS v3.1 base score of 6.2, reflecting a medium severity level, with a vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high confidentiality impact (C:H) but no impact on integrity (I:N) or availability (A:N). The scope remains unchanged (S:U). The vulnerability was reserved in August 2025 and published in October 2025, with no known exploits in the wild and no patches currently available. The cleartext storage of sensitive information in the kernel could allow attackers with local access to extract critical data that may facilitate further attacks or privilege escalation. Since the vulnerability does not require elevated privileges or user interaction, it poses a risk in environments where local access is possible, such as shared workstations or compromised endpoints. The absence of patches necessitates interim mitigations to reduce exposure.

Potential Impact

For European organizations, the primary impact of CVE-2025-55334 lies in the potential exposure of sensitive kernel-level information, which could be leveraged to bypass security controls or facilitate privilege escalation attacks. This confidentiality breach may compromise sensitive data related to system security mechanisms, user credentials, or cryptographic keys stored in the kernel. Organizations with shared or multi-user environments, such as enterprises, educational institutions, and public sector entities, are particularly at risk if local access controls are weak. The vulnerability does not directly affect system integrity or availability, but the indirect consequences of an attacker gaining elevated access could lead to broader compromise, data theft, or persistence mechanisms. Given the medium severity and lack of known exploits, the immediate threat is moderate; however, the risk escalates if attackers develop exploits or if the vulnerability is combined with other weaknesses. European critical infrastructure operators and organizations handling sensitive data should prioritize awareness and mitigation to prevent local exploitation.

Mitigation Recommendations

1. Restrict local access to systems running Windows 11 Version 25H2 (build 10.0.26200.0) by enforcing strict physical and logical access controls, including strong authentication and session locking. 2. Monitor and audit local user activities for unusual behavior that may indicate attempts to access kernel memory or sensitive data. 3. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous kernel-level access or privilege escalation attempts. 4. Isolate high-value or sensitive systems to minimize the number of users with local access. 5. Once Microsoft releases patches or updates addressing CVE-2025-55334, prioritize immediate deployment across all affected systems. 6. Educate users and administrators about the risks of local access vulnerabilities and enforce least privilege principles. 7. Consider using virtualization or sandboxing technologies to limit the impact of potential local exploits. 8. Regularly review and update security policies to incorporate emerging threat intelligence related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-08-12T20:19:59.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85843dd1bfb0b7e3ed0f

Added to database: 10/14/2025, 5:16:52 PM

Last enriched: 1/2/2026, 10:25:18 PM

Last updated: 1/18/2026, 5:31:34 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats