CVE-2025-59284: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 11 version 22H2
Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.
AI Analysis
Technical Summary
CVE-2025-59284 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects Microsoft Windows 11 version 22H2 (build 10.0.22621.0) and involves the Windows NTLM authentication protocol. NTLM, a legacy authentication protocol, is susceptible to spoofing attacks if improperly handled. This vulnerability allows a local attacker without privileges to spoof NTLM authentication, thereby exposing sensitive information that should be protected. The attack vector is local (AV:L), requiring the attacker to have local access to the system. The attack complexity is low (AC:L), and no privileges are required (PR:N), but user interaction is necessary (UI:R), such as tricking a user into performing an action that triggers the vulnerability. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The confidentiality impact is low (C:L), with no impact on integrity (I:N) or availability (A:N). The CVSS score is 3.3, reflecting a low-severity rating. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability highlights the risks associated with legacy protocols like NTLM in modern Windows environments and underscores the need for migration to more secure authentication methods such as Kerberos or multi-factor authentication.
Potential Impact
The primary impact of CVE-2025-59284 is the potential unauthorized disclosure of sensitive information via NTLM spoofing on affected Windows 11 22H2 systems. While the confidentiality impact is low, exposure of sensitive data can aid attackers in further reconnaissance or lateral movement within a network. Since exploitation requires local access and user interaction, remote attacks are unlikely without prior compromise. The vulnerability does not affect system integrity or availability, limiting its potential to cause direct damage or service disruption. However, in environments where NTLM is widely used, especially in enterprise networks with legacy systems, this vulnerability could be leveraged as part of a multi-stage attack chain. Organizations with strict data protection requirements or those handling sensitive information should consider this a risk. The lack of known exploits reduces immediate threat but does not eliminate future risk once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-59284, organizations should: 1) Restrict local access to Windows 11 22H2 systems to trusted users only, minimizing the risk of local attackers. 2) Educate users to avoid interacting with suspicious prompts or actions that could trigger the vulnerability. 3) Disable or limit the use of NTLM authentication where possible, migrating to more secure protocols such as Kerberos or implementing multi-factor authentication. 4) Monitor for official Microsoft patches or updates addressing this vulnerability and apply them promptly once available. 5) Employ endpoint detection and response (EDR) solutions to detect anomalous local authentication activities indicative of spoofing attempts. 6) Review and harden local security policies to reduce attack surface, including limiting unnecessary local privileges and enforcing strong user authentication. 7) Conduct regular security audits focusing on authentication mechanisms and legacy protocol usage within the network environment.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2025-59284: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 11 version 22H2
Description
Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-59284 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects Microsoft Windows 11 version 22H2 (build 10.0.22621.0) and involves the Windows NTLM authentication protocol. NTLM, a legacy authentication protocol, is susceptible to spoofing attacks if improperly handled. This vulnerability allows a local attacker without privileges to spoof NTLM authentication, thereby exposing sensitive information that should be protected. The attack vector is local (AV:L), requiring the attacker to have local access to the system. The attack complexity is low (AC:L), and no privileges are required (PR:N), but user interaction is necessary (UI:R), such as tricking a user into performing an action that triggers the vulnerability. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The confidentiality impact is low (C:L), with no impact on integrity (I:N) or availability (A:N). The CVSS score is 3.3, reflecting a low-severity rating. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability highlights the risks associated with legacy protocols like NTLM in modern Windows environments and underscores the need for migration to more secure authentication methods such as Kerberos or multi-factor authentication.
Potential Impact
The primary impact of CVE-2025-59284 is the potential unauthorized disclosure of sensitive information via NTLM spoofing on affected Windows 11 22H2 systems. While the confidentiality impact is low, exposure of sensitive data can aid attackers in further reconnaissance or lateral movement within a network. Since exploitation requires local access and user interaction, remote attacks are unlikely without prior compromise. The vulnerability does not affect system integrity or availability, limiting its potential to cause direct damage or service disruption. However, in environments where NTLM is widely used, especially in enterprise networks with legacy systems, this vulnerability could be leveraged as part of a multi-stage attack chain. Organizations with strict data protection requirements or those handling sensitive information should consider this a risk. The lack of known exploits reduces immediate threat but does not eliminate future risk once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-59284, organizations should: 1) Restrict local access to Windows 11 22H2 systems to trusted users only, minimizing the risk of local attackers. 2) Educate users to avoid interacting with suspicious prompts or actions that could trigger the vulnerability. 3) Disable or limit the use of NTLM authentication where possible, migrating to more secure protocols such as Kerberos or implementing multi-factor authentication. 4) Monitor for official Microsoft patches or updates addressing this vulnerability and apply them promptly once available. 5) Employ endpoint detection and response (EDR) solutions to detect anomalous local authentication activities indicative of spoofing attempts. 6) Review and harden local security policies to reduce attack surface, including limiting unnecessary local privileges and enforcing strong user authentication. 7) Conduct regular security audits focusing on authentication mechanisms and legacy protocol usage within the network environment.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-11T19:36:03.689Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85903dd1bfb0b7e42387
Added to database: 10/14/2025, 5:17:04 PM
Last enriched: 2/22/2026, 9:20:09 PM
Last updated: 3/25/2026, 1:38:45 AM
Views: 132
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.