Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59197: CWE-532: Insertion of Sensitive Information into Log File in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-59197cvecve-2025-59197cwe-532
Published: Tue Oct 14 2025 (10/14/2025, 17:01:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 11/27/2025, 02:55:52 UTC

Technical Analysis

CVE-2025-59197 is a vulnerability classified under CWE-532, which involves the insertion of sensitive information into log files within the Windows ETL (Event Trace Log) Channel on Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw allows an authorized attacker with local access and low privileges (PR:L) to read sensitive information that is improperly recorded in these log files. The vulnerability does not require user interaction (UI:N) and has low attack complexity (AC:L), but it is limited to local access vectors (AV:L). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The vulnerability was published on October 14, 2025, with no known exploits in the wild at this time. The root cause is the inappropriate logging of sensitive data, which could include credentials, tokens, or other private information, into ETL logs accessible to local users. Since ETL logs are often accessible by various system users or administrators, this could lead to unauthorized disclosure of sensitive information if access controls are insufficient. The vulnerability is currently unpatched, with no direct patch links provided, but Microsoft is aware and has assigned the CVE. Organizations should prepare to apply updates once released and review access permissions to ETL logs.

Potential Impact

For European organizations, this vulnerability poses a confidentiality risk by potentially exposing sensitive information through local log files. Attackers with local access—such as malicious insiders, compromised accounts, or attackers who have gained foothold via other means—could extract sensitive data from ETL logs. This could lead to further privilege escalation, lateral movement, or data breaches. The impact is particularly significant for enterprises handling sensitive personal data under GDPR, as unauthorized disclosure could result in regulatory penalties and reputational damage. However, the vulnerability does not affect system integrity or availability, limiting its impact to information disclosure. Organizations with high reliance on Windows 11 Version 25H2 in critical infrastructure, finance, healthcare, or government sectors may face increased risk if local access controls are weak. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Restrict access to Windows ETL log files by enforcing strict file system permissions to limit which users and processes can read these logs. 2. Monitor and audit local user access to ETL logs to detect unauthorized attempts to access sensitive information. 3. Implement the principle of least privilege to reduce the number of users with local access rights on Windows 11 systems. 4. Use endpoint detection and response (EDR) tools to identify suspicious local activity that could indicate attempts to exploit this vulnerability. 5. Once Microsoft releases patches or updates addressing this vulnerability, prioritize their deployment across all affected Windows 11 Version 25H2 systems. 6. Educate system administrators and security teams about the risks of sensitive data in logs and the importance of securing log files. 7. Consider using encryption or secure logging mechanisms if available to protect sensitive information from being logged in plaintext. 8. Review and harden local access policies, especially on shared or multi-user systems, to prevent unauthorized local access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.464Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e40552

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 11/27/2025, 2:55:52 AM

Last updated: 12/3/2025, 5:57:30 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats