
Cloud Vulnerability DB
A community-led vulnerabilities database
Out-of-bounds read vulnerability in Windows NDIS (Network Driver Interface Specification) was discovered and disclosed on October 14, 2025. The vulnerability affects multiple versions of Windows including Windows 11 Version 25H2, Windows Server 2022, Windows 11 version 22H2, Windows Server 2025, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022 23H2 Edition, Windows 11 Version 24H2, and Windows Server 2025 (AttackerKB).
The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (High) with the following vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The attack vector is Local, with Low attack complexity and Low privileges required. No user interaction is needed, and the scope is Unchanged. The impact on Confidentiality, Integrity, and Availability is all rated as High (AttackerKB).
If successfully exploited, this vulnerability allows an authorized attacker to elevate privileges locally on the affected system. The high CVSS impact scores for Confidentiality, Integrity, and Availability (all rated as High) indicate that successful exploitation could result in significant system compromise (AttackerKB).
Microsoft has released security updates to address this vulnerability as part of the October 2025 Patch Tuesday updates. Users are advised to apply the relevant security updates for their affected Windows systems (Qualys).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."