Home / CVE DB / CVE-2025-62221
Standard
Vulnerability Identifier

CVE-2025-62221

2025-12-09
Severity Assessment
7.8
HIGH
CVSS v3.x Score

CISA KEV Active Alert

Date Added
01 Jan 1970
Due Date
N/A
Required Action
Apply updates per vendor instructions.
Clinical Analysis (Description)

Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
High
Integrity
High
Availability
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Weakness Classification

CWE-CWE-416

Affected Population

Affected Configurations

Total: 85 detected entries

Software List Scrollable
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2728
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1551
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1486
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2788
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1965
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1913
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1369
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3930
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5011
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5371
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1425
mi
windows_11_25h2
Vendor: microsoft • v10.0.26200.7171
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4046
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4651
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4291
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4412
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1308
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3803
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3516
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.531
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5737
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1916
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2673
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5608
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6575
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1251
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.887
mi
windows_10_22h2
Vendor: microsoft • v10.0.19041.3920
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2965
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.521
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2604
mi
windows_11_25h2
Vendor: microsoft • v10.0.26200.7092
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2486
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2846
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1128
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2546
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6332
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5854
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3271
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.763
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1732
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1665
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4894
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4170
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2913
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1189
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3086
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1611
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6321
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1009
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1849
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2364
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1791
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2130
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.830
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.950
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.709
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3208
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1840
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5247
mi
windows_10_22h2
Vendor: microsoft • v10.0.19044.2486
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6216
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6456
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3693
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1668
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5965
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5131
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.584
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6093
mi
windows_10_22h2
Vendor: microsoft • v10.0.19044.3324
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3570
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5487
mi
windows_11_25h2
Vendor: microsoft • v10.0.26200.6899
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.1085
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3393
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3324
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2251
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3448
mi
windows_10_22h2
Vendor: microsoft • v10.0.19042.2486
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2311
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3087
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3031
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3155
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4780
mi
windows_server_2022_23h2
Vendor: microsoft • v10.0.25398.643
Timeline

Time Line

PUBLICATION
09 Dec 2025
MODIFICATION
10 Dec 2025
Impact Statistics

Key Metrics

CVSS Score
7.8
HIGH
Products
85
Affected
Articles
1
Published
Active Exploitation Confirmed
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Associated Cyber Intelligence

Related News Articles

1 article(s) mentioning this vulnerability

Article #1

Microsoft Patch Tuesday, December 2025 Edition: A Comprehensive Security Update

Microsoft releases December 2025 Patch Tuesday update addressing over 1,100 security flaws, including critical vulnerabilities affecting Windows and Office applications.

7
01 Jan 2026 Vulnerability HIGH
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.

⚠️ MAXIMUM PRIORITY - Immediate action required