Home
Description
Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.
PUBLISHED Reserved 2025-09-10 | Published 2025-10-14 | Updated 2025-10-15 | Assigner microsoft
MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Problem types
CWE-532: Insertion of Sensitive Information into Log File
Product status
10.0.26200.0 before 10.0.26200.6899
affected
10.0.17763.0 before 10.0.17763.7919
affected
10.0.17763.0 before 10.0.17763.7919
affected
10.0.17763.0 before 10.0.17763.7919
affected
10.0.20348.0 before 10.0.20348.4294
affected
10.0.19044.0 before 10.0.19044.6456
affected
10.0.22621.0 before 10.0.22621.6060
affected
10.0.19045.0 before 10.0.19045.6456
affected
10.0.26100.0 before 10.0.26100.6899
affected
10.0.22631.0 before 10.0.22631.6060
affected
10.0.22631.0 before 10.0.22631.6060
affected
10.0.25398.0 before 10.0.25398.1913
affected
10.0.26100.0 before 10.0.26100.6899
affected
10.0.26100.0 before 10.0.26100.6899
affected
10.0.10240.0 before 10.0.10240.21161
affected
10.0.14393.0 before 10.0.14393.8519
affected
10.0.14393.0 before 10.0.14393.8519
affected
10.0.14393.0 before 10.0.14393.8519
affected
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197 (Windows ETL Channel Information Disclosure Vulnerability) vendor-advisory
cve.org
(CVE-2025-59197)
nvd.nist.gov
(CVE-2025-59197)
Download JSON