CVE-2025-24991 vulnerability in Microsoft Products
Published on March 11, 2025


Known Exploited Vulnerability
This Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that could allow for information disclosure.
The following remediation steps are recommended / required by April 1, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2025-24991 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Out-of-bounds Read
The software reads data past the end, or before the beginning, of the intended buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
Products Associated with CVE-2025-24991
You can be notified by stack.watch whenever vulnerabilities like CVE-2025-24991 are published in these products:
What versions are vulnerable to CVE-2025-24991?
-
Microsoft Windows Server 2008 Version r2 sp1 x64
-
Microsoft Windows Server 2012 Version r2
-
Microsoft Windows Server 2016 Version -
-
Microsoft Windows Server 2012 Version -
-
Microsoft Windows Server 2008 Version - sp2 x64
-
Microsoft Windows Server 2019 Version -
-
Microsoft Windows 10 1507 Fixed in Version 10.0.10240.20947 x64
-
Microsoft Windows 10 1507 Fixed in Version 10.0.10240.20947 x86
-
Microsoft Windows 10 1607 Fixed in Version 10.0.14393.7876 x64
-
Microsoft Windows 10 1607 Fixed in Version 10.0.14393.7876 x86
-
Microsoft Windows 10 1809 Fixed in Version 10.0.17763.7009 x64
-
Microsoft Windows 10 1809 Fixed in Version 10.0.17763.7009 x86
-
Microsoft Windows 10 21h2 Fixed in Version 10.0.19044.5608 arm64
-
Microsoft Windows 10 21h2 Fixed in Version 10.0.19044.5608 x64
-
Microsoft Windows 10 21h2 Fixed in Version 10.0.19044.5608 x86
-
Microsoft Windows Server 2008 Version - sp2 x86
-
Microsoft Windows Server 2022 23h2 Fixed in Version 10.0.25398.1486 x64
-
Microsoft Windows Server 2025 Fixed in Version 10.0.26100.3403 x64
-
Microsoft Windows 10 22h2 Fixed in Version 10.0.19045.5608 arm64
-
Microsoft Windows 10 22h2 Fixed in Version 10.0.19045.5608 x64
-
Microsoft Windows 10 22h2 Fixed in Version 10.0.19045.5608 x86
-
Microsoft Windows 11 22h2 Fixed in Version 10.0.22621.5039 arm64
-
Microsoft Windows 11 22h2 Fixed in Version 10.0.22621.5039 x64
-
Microsoft Windows 11 23h2 Fixed in Version 10.0.22631.5039 arm64
-
Microsoft Windows 11 23h2 Fixed in Version 10.0.22631.5039 x64
-
Microsoft Windows 11 24h2 Fixed in Version 10.0.26100.3403 arm64
-
Microsoft Windows 11 24h2 Fixed in Version 10.0.26100.3403 x64
-
Microsoft Windows Server 2022 Fixed in Version 10.0.20348.3270