Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59211: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-59211cvecve-2025-59211cwe-200
Published: Tue Oct 14 2025 (10/14/2025, 17:00:35 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:46:04 UTC

Technical Analysis

CVE-2025-59211 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw exists in the Windows Push Notification Core component, which is responsible for managing push notifications on the system. An authorized attacker with local access and low privileges can exploit this vulnerability to disclose sensitive information stored or processed by this component. The vulnerability does not require user interaction and does not allow modification or disruption of system operations, focusing solely on confidentiality breaches. The CVSS v3.1 score of 5.5 reflects a medium severity, with attack vector local (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impact limited to confidentiality (C:H, I:N, A:N). No known exploits have been reported in the wild, and no official patches have been published at the time of analysis. The vulnerability's root cause likely involves improper access control or insufficient data protection within the notification core, allowing unauthorized local disclosure of sensitive data. This vulnerability highlights the risk posed by local privilege attackers who can gain information that may facilitate further attacks or data leakage.

Potential Impact

For European organizations, the primary impact of CVE-2025-59211 is the potential unauthorized disclosure of sensitive information on Windows 11 25H2 systems. This could include personal data, credentials, or proprietary information handled by the Windows Push Notification Core. Confidentiality breaches can lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential reputational damage. Since exploitation requires local access with low privileges, the threat is more significant in environments where endpoint security is weak or insider threats exist. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the information disclosed could be leveraged for lateral movement or privilege escalation in targeted attacks. Sectors such as finance, healthcare, government, and critical infrastructure in Europe, which rely heavily on Windows 11, may face increased risks. The absence of known exploits reduces immediate threat levels but does not eliminate the need for vigilance.

Mitigation Recommendations

1. Restrict local access to Windows 11 25H2 systems by enforcing strict access controls and least privilege principles to minimize the number of users who can exploit this vulnerability. 2. Monitor and audit local user activities and system logs for unusual access patterns or attempts to access the Windows Push Notification Core component. 3. Deploy endpoint detection and response (EDR) solutions capable of detecting suspicious local privilege activities. 4. Apply security hardening measures such as disabling unnecessary services and features related to push notifications if not required. 5. Once Microsoft releases an official patch or update addressing CVE-2025-59211, prioritize its deployment across all affected systems. 6. Educate users and administrators about the risks of local privilege misuse and enforce strong authentication mechanisms to reduce insider threat risks. 7. Consider network segmentation and endpoint isolation strategies to limit the impact of compromised local accounts. 8. Regularly review and update security policies to incorporate emerging threats related to local information disclosure vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T00:32:30.948Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858c3dd1bfb0b7e40648

Added to database: 10/14/2025, 5:17:00 PM

Last enriched: 11/27/2025, 3:46:04 AM

Last updated: 12/1/2025, 4:11:48 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats