Vulnerability vector:
- Base vulnerability score (CVSSv3.1): CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Severity (CVSSv3.1): 7.8 (High)
Description:
The Null pointer dereference vulnerability was discovered in Windows TCP/IP Driver. The vulnerability allows an authorized attacker to gain SYSTEM privileges. The affected products:
- Windows Server 2019 & Server 2019 (Server Core installation) (Versions to 10.0.17763.7558)
- Windows 10 Version 1809 for x64-based & 32-bit Systems (Versions to 10.0.17763.7558)
- Windows Server 2012 R2 & Server 2012 R2 (Server Core installation) (Versions to 6.3.9600.22676)
- Windows Server 2012 & Server 2012 (Server Core installation) (Versions to 6.2.9200.25573)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 & Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Versions to 6.1.7601.27820)
- Windows Server 2008 for x64-based & 32-bit Systems Service Pack 2 & Windows Server 2008 for x64-based & 32-bit Systems Service Pack 2 (Server Core installation) (Versions to 6.0.6003.23418)
- Windows Server 2016 & Server 2016 (Server Core installation) (Versions to 10.0.14393.8246)
- Windows 10 Version 1607 for x64-based & 32-bit Systems (Versions to 10.0.14393.8246)
- Windows 10 for x64-based & 32-bit Systems (Versions to 10.0.10240.21073)
- Windows Server 2025 & Server 2025 (Server Core installation) & Windows 11 Version 24H2 for x64-based & ARM64-based Systems (Versions to 10.0.26100.4652)
- Windows Server 2022, 23H2 Edition (Server Core installation) (Versions to 10.0.25398.1732)
- Windows 11 Version 23H2 for x64-based & ARM64-based Systems (Versions to 10.0.22631.5624)
- Windows 10 Version 22H2 for 32-bit & ARM64-based & x64-based Systems (Versions to 10.0.19045.6093)
- Windows 11 Version 22H2 for x64-based & ARM64-based Systems (Versions to 10.0.22621.5624)
- Windows 10 Version 21H2 for x64-based & ARM64-based & 32-bit Systems (Versions to 10.0.19044.6093)
- Windows Server 2022 & Server 2022 (Server Core installation) (Versions to 10.0.20348.3932)
Vulnerability status: Confirmed by vendor
Date of vulnerability remediation: 08.07.2025
Recommendations:
Additional information: Press Release
Researcher: Marat Gayanov (Positive Technologies)
Identifiers:
CVE-2025-49686
BDU:2025-04862
Vendor:
Microsoft Corporation