Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58720: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Microsoft Windows 11 Version 25H2

0
High
VulnerabilityCVE-2025-58720cvecve-2025-58720cwe-1240
Published: Tue Oct 14 2025 (10/14/2025, 17:01:16 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:35:19 UTC

Technical Analysis

CVE-2025-58720 is a vulnerability classified under CWE-1240, which pertains to the use of cryptographic primitives with risky or flawed implementations. Specifically, this vulnerability exists in the Windows Cryptographic Services component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw allows an authorized attacker with local access to exploit the cryptographic primitive's weak implementation to disclose sensitive information. The cryptographic primitive in question likely involves core cryptographic operations such as encryption, decryption, or key management, where improper implementation can lead to leakage of cryptographic keys or plaintext data. The CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that the attack vector is local, with low attack complexity, requiring some privileges but no user interaction, and results in high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability's nature suggests that attackers with authorized local access could leverage it to compromise system security significantly. The vulnerability was reserved in early September 2025 and published in mid-October 2025, with no patch links currently available, indicating that remediation may be forthcoming but not yet released. This vulnerability is critical because cryptographic services underpin many security mechanisms, and their compromise can cascade into broader system and data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-58720 is substantial. Since Windows 11 is widely deployed across enterprises, government agencies, and critical infrastructure sectors in Europe, the vulnerability poses a risk of unauthorized disclosure of sensitive information, including cryptographic keys, credentials, or protected data. This can lead to further exploitation such as privilege escalation, data tampering, or denial of service. The requirement for local access limits remote exploitation but raises concerns for insider threats, compromised endpoints, or attackers who gain physical or remote desktop access. The high impact on confidentiality, integrity, and availability means that affected organizations could face data breaches, operational disruptions, and compliance violations under regulations like GDPR. Critical sectors such as finance, healthcare, and energy are particularly vulnerable due to the sensitive nature of their data and the reliance on cryptographic protections. The absence of a patch at the time of disclosure necessitates immediate risk management and mitigation efforts to prevent exploitation.

Mitigation Recommendations

1. Monitor for official Microsoft security advisories and apply patches promptly once released to address CVE-2025-58720. 2. Restrict local access to systems running Windows 11 Version 25H2 by enforcing strict access controls, including limiting administrative privileges and using endpoint protection solutions. 3. Implement robust endpoint detection and response (EDR) tools to detect anomalous behavior related to cryptographic service usage or unauthorized local access attempts. 4. Employ network segmentation to isolate critical systems and reduce the risk of lateral movement by attackers who gain local access. 5. Conduct regular audits of user accounts and privileges to minimize the number of authorized users who could exploit this vulnerability. 6. Educate staff about the risks of insider threats and enforce policies to prevent unauthorized physical or remote access. 7. Consider temporary compensating controls such as disabling non-essential cryptographic services or features if feasible until patches are available. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.256Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85883dd1bfb0b7e3f8da

Added to database: 10/14/2025, 5:16:56 PM

Last enriched: 1/2/2026, 10:35:19 PM

Last updated: 1/19/2026, 8:03:21 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats