Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-59033

Опубликовано: 08 сент. 2025
Источник: nvd
CVSS3: 7.4
CVSS3: 6.7
EPSS Низкий

Описание

The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. Entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate's TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) may not be blocked, whether hypervisor-protected code integrity (HVCI) is enabled or not. NOTE: The vendor disputes this CVE ID assignment and states that the driver blocklist is intended for use with HVCI.

EPSS

Процентиль: 12%
0.0004
Низкий

7.4 High

CVSS3

6.7 Medium

CVSS3

Дефекты

CWE-420
CWE-693

Связанные уязвимости

CVSS3: 9.8
github
5 месяцев назад

The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. On systems that do not have hypervisor-protected code integrity (HVCI) enabled, entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate’s TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) will not be blocked. This vulnerability affects any Windows system that does not have HVCI enabled or supported (HVCI is available in Windows 10, Windows 11, and Windows Server 2016 and later). NOTE: The vendor states that the driver blocklist is intended for use with HVCI, while systems without HVCI should use App Control, and any custom blocklist entries require a granular approach for proper enforcement.

EPSS

Процентиль: 12%
0.0004
Низкий

7.4 High

CVSS3

6.7 Medium

CVSS3

Дефекты

CWE-420
CWE-693
Уязвимость CVE-2025-59033