Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58729: CWE-1287: Improper Validation of Specified Type of Input in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-58729cvecve-2025-58729cwe-1287
Published: Tue Oct 14 2025 (10/14/2025, 17:01:20 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 11/27/2025, 02:51:06 UTC

Technical Analysis

CVE-2025-58729 is a vulnerability classified under CWE-1287, indicating improper validation of specified input types within the Windows Local Session Manager (LSM) component in Windows 11 Version 25H2 (build 10.0.26200.0). The LSM is responsible for managing user sessions and authentication processes locally on Windows systems. This vulnerability arises because LSM does not correctly validate the type of input it receives, which can be exploited by an attacker who already has some level of authorized access to the system. By sending specially crafted input over the network, the attacker can trigger a denial of service (DoS) condition, causing the LSM service to crash or become unresponsive, thereby disrupting session management and potentially forcing system reboots or loss of user connectivity. The CVSS 3.1 base score is 6.5, reflecting a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The exploitability is moderate since it requires local privileges but no user interaction, making it feasible for insiders or compromised accounts. No public exploits or patches are currently available, increasing the urgency for monitoring and mitigation. This vulnerability could be leveraged in targeted attacks to disrupt critical services relying on Windows 11 session management.

Potential Impact

For European organizations, the primary impact of CVE-2025-58729 is on the availability of systems running Windows 11 Version 25H2. Disruption of the Local Session Manager can lead to session failures, forced logouts, or system instability, affecting user productivity and potentially critical services. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on stable Windows environments could experience operational interruptions. Since the attack requires authorized access, insider threats or compromised credentials pose a significant risk. The denial of service could be used as a diversion tactic or to cause downtime during targeted attacks. While confidentiality and integrity are not directly impacted, the availability disruption can have cascading effects on business continuity and service delivery. Organizations with remote or hybrid workforces using Windows 11 devices are particularly vulnerable to network-based DoS attacks exploiting this flaw.

Mitigation Recommendations

To mitigate CVE-2025-58729, European organizations should implement strict network segmentation and access controls to limit exposure of Windows 11 systems to only trusted users and devices. Enforce the principle of least privilege to reduce the number of accounts with local privileges capable of exploiting this vulnerability. Monitor Windows Event Logs and LSM-related service behavior for anomalies or crashes that could indicate exploitation attempts. Employ endpoint detection and response (EDR) solutions to detect unusual network traffic patterns targeting LSM. Prepare to deploy Microsoft patches promptly once released, and consider temporary workarounds such as disabling unnecessary network services or restricting LSM network access via firewall rules. Conduct user awareness training to reduce insider threat risks and ensure robust credential management practices are in place. Regularly update and audit security configurations to maintain resilience against exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85893dd1bfb0b7e3fd77

Added to database: 10/14/2025, 5:16:57 PM

Last enriched: 11/27/2025, 2:51:06 AM

Last updated: 11/28/2025, 1:35:40 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats