Windows Virtual Trusted Platform Module Denial of Service Vulnerability
Released: Jan 14, 2025
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2025-21280
- Impact
- Denial of Service
- Max Severity
- Important
- Weakness
- CVSS Source
- Microsoft
- Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 5.5 / 4.8Base score metrics: 5.5 / Temporal score metrics: 4.8
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
FAQ
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
A successful exploitation of this vulnerability via a medium integrity level exploit could allow an attacker to gain unauthorized access to system-level resources, potentially modify kernel memory, and execute arbitrary code with kernel-level privileges. This could lead to a full compromise of the system’s integrity, confidentiality, and availability.
Are there any additional steps that I need to follow to be protected from this vulnerability?
The changes to address this vulnerability updated Virtual Secure Mode components. The policy described in Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates has been updated to account for the latest changes. If you deployed this policy, then you'll need to redeploy using the updated policy.
Acknowledgements
- HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- 10.0.19045.5371
- 10.0.19045.5371
- 10.0.19045.5371
- 10.0.22621.4751
- 10.0.22621.4751
- 10.0.19044.5371
- 10.0.19044.5371
- 10.0.14393.7699
- 10.0.14393.7699
- 10.0.14393.7699
- 10.0.10240.20890
- 10.0.10240.20890
- 10.0.26100.2894
- 10.0.26100.2894
- 10.0.25398.1369
- 10.0.22631.4751
- 10.0.22631.4751
- 10.0.26100.2894
- 10.0.19044.5371
- 10.0.20348.3091
- 10.0.17763.6775
- 10.0.17763.6775
- 10.0.17763.6775
Disclaimer
Revisions
Information published.