Windows Kerberos Security Feature Bypass Vulnerability
Released: Jan 14, 2025
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2025-21299
- Impact
- Security Feature Bypass
- Max Severity
- Important
- Weakness
- CVSS Source
- Microsoft
- Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 7.1 / 6.2Base score metrics: 7.1 / Temporal score metrics: 6.2
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation More Likely
FAQ
What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Windows Defender Credential Guard Feature to leak Kerberos Credential.
Are there any additional steps that I need to follow to be protected from this vulnerability?
The changes to address this vulnerability updated Virtual Secure Mode components. The policy described in Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates has been updated to account for the latest changes. If you deployed this policy, then you'll need to redeploy using the updated policy.
Acknowledgements
- Ceri Coburn with NetSPI
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- 10.0.26100.2894
- 10.0.26100.2894
- 10.0.26100.2894
- 10.0.25398.1369
- 10.0.22631.4751
- 10.0.22631.4751
- 10.0.14393.7699
- 10.0.14393.7699
- 10.0.14393.7699
- 10.0.14393.7699
- 10.0.10240.20890
- 10.0.10240.20890
- 10.0.26100.2894
- 10.0.19045.5371
- 10.0.19045.5371
- 10.0.19045.5371
- 10.0.22621.4751
- 10.0.22621.4751
- 10.0.19044.5371
- 10.0.19044.5371
- 10.0.19044.5371
- 10.0.20348.3091
- 10.0.20348.3091
- 10.0.17763.6775
- 10.0.17763.6775
- 10.0.17763.6775
- 10.0.17763.6775
Disclaimer
Revisions
Information published.