Description
Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.
Reserved 2025-02-12 | Published 2025-04-08 | Updated 2025-05-30 | Assigner
microsoftHIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Problem types
CWE-416: Use After Free
Product status
10.0.17763.0 before 10.0.17763.7136
affected
10.0.17763.0 before 10.0.17763.7136
affected
10.0.17763.0 before 10.0.17763.7136
affected
10.0.20348.0 before 10.0.20348.3453
affected
10.0.19044.0 before 10.0.19044.5737
affected
10.0.22621.0 before 10.0.22621.5189
affected
10.0.19045.0 before 10.0.19045.5737
affected
10.0.26100.0 before 10.0.26100.3775
affected
10.0.22631.0 before 10.0.22631.5189
affected
10.0.22631.0 before 10.0.22631.5189
affected
10.0.25398.0 before 10.0.25398.1551
affected
10.0.26100.0 before 10.0.26100.3775
affected
10.0.26100.0 before 10.0.26100.3775
affected
10.0.10240.0 before 10.0.10240.20978
affected
10.0.14393.0 before 10.0.14393.7969
affected
10.0.14393.0 before 10.0.14393.7969
affected
10.0.14393.0 before 10.0.14393.7969
affected
6.0.6003.0 before 6.0.6003.23220
affected
6.0.6003.0 before 6.0.6003.23220
affected
6.0.6003.0 before 6.0.6003.23220
affected
6.1.7601.0 before 6.1.7601.27670
affected
6.1.7601.0 before 6.1.7601.27670
affected
6.2.9200.0 before 6.2.9200.25423
affected
6.2.9200.0 before 6.2.9200.25423
affected
6.3.9600.0 before 6.3.9600.22523
affected
6.3.9600.0 before 6.3.9600.22523
affected
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663 (Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability) vendor-advisory
cve.org (CVE-2025-26663)
nvd.nist.gov (CVE-2025-26663)
Download JSON