Windows Virtual Trusted Platform Module Denial of Service Vulnerability
Released: Jan 14, 2025
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2025-21284
- Impact
- Denial of Service
- Max Severity
- Important
- Weakness
- CVSS Source
- Microsoft
- Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 5.5 / 4.8Base score metrics: 5.5 / Temporal score metrics: 4.8
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
FAQ
According to the CVSS metric, successful exploitation of this vulnerability could lead to a total loss of availability (A:H). What does that mean for this vulnerability?
If an attacker was able to successfully exploit the vulnerability the attack might result in a total loss of availability.
Are there any additional steps that I need to follow to be protected from this vulnerability?
The changes to address this vulnerability updated Virtual Secure Mode components. The policy described in Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates has been updated to account for the latest changes. If you deployed this policy, then you'll need to redeploy using the updated policy.
Acknowledgements
- HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- 10.0.14393.7699
- 10.0.14393.7699
- 10.0.14393.7699
- 10.0.10240.20890
- 10.0.10240.20890
- 10.0.26100.2894
- 10.0.26100.2894
- 10.0.25398.1369
- 10.0.22631.4751
- 10.0.22631.4751
- 10.0.26100.2894
- 10.0.19045.5371
- 10.0.19045.5371
- 10.0.19045.5371
- 10.0.22621.4751
- 10.0.22621.4751
- 10.0.19044.5371
- 10.0.19044.5371
- 10.0.19044.5371
- 10.0.20348.3091
- 10.0.17763.6775
- 10.0.17763.6775
- 10.0.17763.6775
Disclaimer
Revisions
Information published.