We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs.
Reserved 2025-07-15 | Published 2025-07-28 | Updated 2025-07-28 | Assigner DragosCWE-427 Uncontrolled Search Path Element
raw.githubusercontent.com/...ure/refs/heads/main/2025-04.txt
Support options