Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-33069

Опубликовано: 10 июн. 2025
Источник: msrc
CVSS3: 5.1
EPSS Низкий

Описание

Windows App Control for Business Security Feature Bypass Vulnerability

Improper verification of cryptographic signature in App Control for Business (WDAC) allows an unauthorized attacker to bypass a security feature locally.

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker can spoof the signature to get it to bypass App Control policy.

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:L), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability).

Обновления

ПродуктСтатьяОбновление
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2025
Windows Server 2025 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 4%
0.00021
Низкий

5.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.1
nvd
8 дней назад

Improper verification of cryptographic signature in App Control for Business (WDAC) allows an unauthorized attacker to bypass a security feature locally.

CVSS3: 5.1
github
8 дней назад

Improper verification of cryptographic signature in App Control for Business (WDAC) allows an unauthorized attacker to bypass a security feature locally.

EPSS

Процентиль: 4%
0.00021
Низкий

5.1 Medium

CVSS3