Home
Description
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
PUBLISHED Reserved 2025-09-03 | Published 2025-10-14 | Updated 2025-10-15 | Assigner microsoft
HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Problem types
CWE-416: Use After Free
Product status
10.0.26200.0 before 10.0.26200.6899
affected
10.0.17763.0 before 10.0.17763.7919
affected
10.0.17763.0 before 10.0.17763.7919
affected
10.0.17763.0 before 10.0.17763.7919
affected
10.0.20348.0 before 10.0.20348.4294
affected
10.0.19044.0 before 10.0.19044.6456
affected
10.0.22621.0 before 10.0.22621.6060
affected
10.0.19045.0 before 10.0.19045.6456
affected
10.0.26100.0 before 10.0.26100.6899
affected
10.0.22631.0 before 10.0.22631.6060
affected
10.0.22631.0 before 10.0.22631.6060
affected
10.0.25398.0 before 10.0.25398.1913
affected
10.0.26100.0 before 10.0.26100.6899
affected
10.0.26100.0 before 10.0.26100.6899
affected
10.0.10240.0 before 10.0.10240.21161
affected
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738 (Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability) vendor-advisory
cve.org
(CVE-2025-58738)
nvd.nist.gov
(CVE-2025-58738)
Download JSON