Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-53139

Опубликовано: 14 окт. 2025
Источник: msrc
CVSS3: 7.7
EPSS Низкий

Описание

Windows Hello Security Feature Bypass Vulnerability

Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the Windows Hello Facial and Fingerprint Recognition security feature.

Where can I find more information about Windows Hello Face Authentication?

Please see Windows Hello Face Authentication and/or Windows Hello Fingerprint Authentication for updated details.

Обновления

ПродуктСтатьяОбновление
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 4%
0.0002
Низкий

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 7.7
nvd
20 дней назад

Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.

CVSS3: 7.7
github
20 дней назад

Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.

EPSS

Процентиль: 4%
0.0002
Низкий

7.7 High

CVSS3