Home

Description

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.

PUBLISHED Reserved 2025-09-03 | Published 2025-10-14 | Updated 2025-10-15 | Assigner microsoft




HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-416: Use After Free

Product status

10.0.26200.0 before 10.0.26200.6899
affected

10.0.17763.0 before 10.0.17763.7919
affected

10.0.17763.0 before 10.0.17763.7919
affected

10.0.17763.0 before 10.0.17763.7919
affected

10.0.20348.0 before 10.0.20348.4294
affected

10.0.19044.0 before 10.0.19044.6456
affected

10.0.22621.0 before 10.0.22621.6060
affected

10.0.19045.0 before 10.0.19045.6456
affected

10.0.26100.0 before 10.0.26100.6899
affected

10.0.22631.0 before 10.0.22631.6060
affected

10.0.22631.0 before 10.0.22631.6060
affected

10.0.25398.0 before 10.0.25398.1913
affected

10.0.26100.0 before 10.0.26100.6899
affected

10.0.26100.0 before 10.0.26100.6899
affected

10.0.10240.0 before 10.0.10240.21161
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738 (Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability) vendor-advisory

cve.org (CVE-2025-58738)

nvd.nist.gov (CVE-2025-58738)

Download JSON