VulnerAlert



APPLICATION
MICROSOFT
SYSTEMS
08-09-2025 21:05

CVE-2025-59033 Vulnerabilidad documentada

Sin puntuación
Tags
#windows 11
#windows 10
#windows
#server
#list
#drive
#systems
#microsoft
#application
#vulnerability
#/windows(.*)11/iU
#/windows(.*)10/iU
#vulnerable
#protect
#defend
#affect
Descripción
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. On systems that do not have hypervisor-protected code integrity (HVCI) enabled, entries specify only the to-be-signed (TBS) part of signer certificate are properly blocked, but signing certificate’s TBS hash along with a 'FileAttribRef' qualifier (such file name or version) will be blocked. This vulnerability affects any system does HVCI enabled supported (HVCI available in 10, 11, and Server 2016 later). NOTE: The vendor states blocklist intended for use HVCI, while without should App Control, custom require granular approach proper enforcement.
https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules
https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity
https://x.com/JonnyJohnson_/status/1895103112924307727
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2025-59033
Resultados similares
Coincidentes en almenos en 50% de los tags
09-09-2025 CVE-2025-40804
A vulnerability has been identified in SIMATIC Virtualization as a Service (SIVaaS) (All versio...
Ver información
08-09-2025 CVE-2025-42927
SAP NetWeaver AS Java application uses Adobe Document Service, installed with a vulnerable vers...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por