Jun 2025: Windows Schannel Remote Code Execution Vulnerability
CVE-2025-29828 Published on June 10, 2025

Windows Schannel Remote Code Execution Vulnerability
Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network.

Vendor Advisory NVD

Weakness Type

What is a Memory Leak Vulnerability?

The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory. This is often triggered by improper handling of malformed data or unexpectedly interrupted sessions. In some languages, developers are responsible for tracking memory allocation and releasing the memory. If there are no more pointers or references to the memory, then it can no longer be tracked and identified for release.

CVE-2025-29828 has been classified to as a Memory Leak vulnerability or weakness.


Products Associated with CVE-2025-29828

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 
 
 

Affected Versions

Microsoft Windows 11 version 22H2: Microsoft Windows 11 version 22H3: Microsoft Windows 11 Version 23H2: Microsoft Windows 11 Version 24H2: Microsoft Windows Server 2022: Microsoft Windows Server 2022, 23H2 Edition (Server Core installation): Microsoft Windows Server 2025: Microsoft Windows Server 2025 (Server Core installation):

Exploit Probability

EPSS
0.89%
Percentile
75.56%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.