CVE-2025-55695: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 25H2
Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-55695 is a medium-severity vulnerability identified in the Windows WLAN Auto Config Service component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw is classified as a CWE-125: Out-of-bounds Read, where the service improperly reads memory outside the allocated buffer boundaries. This vulnerability can be exploited by an attacker with authorized local access to the system, allowing them to disclose sensitive information from memory that should not be accessible. The vulnerability does not require user interaction and does not affect the integrity or availability of the system, limiting its impact to confidentiality breaches. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack vector is local, with low complexity, requiring low privileges but no user interaction, and results in high confidentiality impact. No public exploits or patches are currently available, and the vulnerability was reserved in August 2025 and published in October 2025. The WLAN Auto Config Service manages wireless network configurations, so the leaked information could include sensitive wireless credentials or configuration data, which could facilitate further attacks if combined with other vulnerabilities or social engineering. The vulnerability's scope is limited to Windows 11 25H2 installations, specifically build 10.0.26200.0, and affects only systems where an attacker can gain local access with some privileges.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Sensitive wireless configuration data or credentials could be exposed, potentially enabling lateral movement or further compromise within corporate networks. Organizations with high reliance on wireless connectivity, such as enterprises with extensive Wi-Fi infrastructure, government agencies, and critical infrastructure operators, may face increased risk. The vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. However, the exposure of sensitive information could lead to targeted attacks or espionage, especially in sectors handling sensitive or classified data. Since exploitation requires local access with privileges, the threat is more significant in environments where endpoint security is weak or where insider threats exist. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. European organizations should consider this vulnerability in their risk assessments and prioritize patching once updates are released.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply security patches promptly once they become available for Windows 11 Version 25H2. 2. Restrict local access to systems running the affected Windows version by enforcing strict access controls and using endpoint protection solutions to detect unauthorized privilege escalations. 3. Implement network segmentation to limit the impact of any potential compromise, especially isolating wireless configuration management systems. 4. Conduct regular audits of user privileges to ensure that only authorized personnel have local access with sufficient privileges to exploit this vulnerability. 5. Employ endpoint detection and response (EDR) tools to monitor for suspicious activity related to the WLAN Auto Config Service or unusual memory access patterns. 6. Educate users and administrators about the risks of local privilege misuse and enforce strong physical security controls to prevent unauthorized local access. 7. Consider disabling or restricting the WLAN Auto Config Service on systems where wireless connectivity is not required or can be managed through alternative means. 8. Maintain up-to-date backups and incident response plans to quickly respond to any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2025-55695: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 25H2
Description
Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-55695 is a medium-severity vulnerability identified in the Windows WLAN Auto Config Service component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw is classified as a CWE-125: Out-of-bounds Read, where the service improperly reads memory outside the allocated buffer boundaries. This vulnerability can be exploited by an attacker with authorized local access to the system, allowing them to disclose sensitive information from memory that should not be accessible. The vulnerability does not require user interaction and does not affect the integrity or availability of the system, limiting its impact to confidentiality breaches. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack vector is local, with low complexity, requiring low privileges but no user interaction, and results in high confidentiality impact. No public exploits or patches are currently available, and the vulnerability was reserved in August 2025 and published in October 2025. The WLAN Auto Config Service manages wireless network configurations, so the leaked information could include sensitive wireless credentials or configuration data, which could facilitate further attacks if combined with other vulnerabilities or social engineering. The vulnerability's scope is limited to Windows 11 25H2 installations, specifically build 10.0.26200.0, and affects only systems where an attacker can gain local access with some privileges.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Sensitive wireless configuration data or credentials could be exposed, potentially enabling lateral movement or further compromise within corporate networks. Organizations with high reliance on wireless connectivity, such as enterprises with extensive Wi-Fi infrastructure, government agencies, and critical infrastructure operators, may face increased risk. The vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. However, the exposure of sensitive information could lead to targeted attacks or espionage, especially in sectors handling sensitive or classified data. Since exploitation requires local access with privileges, the threat is more significant in environments where endpoint security is weak or where insider threats exist. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. European organizations should consider this vulnerability in their risk assessments and prioritize patching once updates are released.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply security patches promptly once they become available for Windows 11 Version 25H2. 2. Restrict local access to systems running the affected Windows version by enforcing strict access controls and using endpoint protection solutions to detect unauthorized privilege escalations. 3. Implement network segmentation to limit the impact of any potential compromise, especially isolating wireless configuration management systems. 4. Conduct regular audits of user privileges to ensure that only authorized personnel have local access with sufficient privileges to exploit this vulnerability. 5. Employ endpoint detection and response (EDR) tools to monitor for suspicious activity related to the WLAN Auto Config Service or unusual memory access patterns. 6. Educate users and administrators about the risks of local privilege misuse and enforce strong physical security controls to prevent unauthorized local access. 7. Consider disabling or restricting the WLAN Auto Config Service on systems where wireless connectivity is not required or can be managed through alternative means. 8. Maintain up-to-date backups and incident response plans to quickly respond to any exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-08-13T20:00:27.683Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85873dd1bfb0b7e3f5a7
Added to database: 10/14/2025, 5:16:55 PM
Last enriched: 1/2/2026, 10:32:08 PM
Last updated: 1/19/2026, 10:14:02 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1148: Cross-Site Request Forgery in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1147: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
Medium19th January – Threat Intelligence Report
MediumCVE-2026-1146: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-59355: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Linkis
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.