High7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

PT-2025-73: NULL pointer dereference in Windows TCP/IP Driver

Vulnerability vector:

  • Base vulnerability score (CVSSv3.1): CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
  • Severity (CVSSv3.1): 7.8 (High)

Description:

The Null pointer dereference vulnerability was discovered in Windows TCP/IP Driver. The vulnerability allows an authorized attacker to gain SYSTEM privileges. The affected products:

  • Windows Server 2019 & Server 2019 (Server Core installation) (Versions to 10.0.17763.7558)
  • Windows 10 Version 1809 for x64-based & 32-bit Systems (Versions to 10.0.17763.7558)
  • Windows Server 2012 R2 & Server 2012 R2 (Server Core installation) (Versions to 6.3.9600.22676)
  • Windows Server 2012 & Server 2012 (Server Core installation) (Versions to 6.2.9200.25573)
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 & Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Versions to 6.1.7601.27820)
  • Windows Server 2008 for x64-based & 32-bit Systems Service Pack 2 & Windows Server 2008 for x64-based & 32-bit Systems Service Pack 2 (Server Core installation) (Versions to 6.0.6003.23418)
  • Windows Server 2016 & Server 2016 (Server Core installation) (Versions to 10.0.14393.8246)
  • Windows 10 Version 1607 for x64-based & 32-bit Systems (Versions to 10.0.14393.8246)
  • Windows 10 for x64-based & 32-bit Systems (Versions to 10.0.10240.21073)
  • Windows Server 2025 & Server 2025 (Server Core installation) & Windows 11 Version 24H2 for x64-based & ARM64-based Systems (Versions to 10.0.26100.4652)
  • Windows Server 2022, 23H2 Edition (Server Core installation) (Versions to 10.0.25398.1732)
  • Windows 11 Version 23H2 for x64-based & ARM64-based Systems (Versions to 10.0.22631.5624)
  • Windows 10 Version 22H2 for 32-bit & ARM64-based & x64-based Systems (Versions to 10.0.19045.6093)
  • Windows 11 Version 22H2 for x64-based & ARM64-based Systems (Versions to 10.0.22621.5624)
  • Windows 10 Version 21H2 for x64-based & ARM64-based & 32-bit Systems (Versions to 10.0.19044.6093)
  • Windows Server 2022 & Server 2022 (Server Core installation) (Versions to 10.0.20348.3932)

Vulnerability status: Confirmed by vendor

Date of vulnerability remediation: 08.07.2025

Recommendations:

Additional information: Press Release

Researcher: Marat Gayanov (Positive Technologies)

Identifiers:

CVE-2025-49686

BDU:2025-04862

Vendor:

Microsoft Corporation

Threatscape