⚠️ CISA Known Exploited Vulnerability
Active ThreatThis vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.
CVE-2025-62221
High CISA KEVVulnerability Description
Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
85 configuration(s) from 1 vendor(s)
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2728:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1551:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1486:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2788:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1965:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1913:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1369:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3930:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5011:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5371:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1425:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.7171:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4046:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4651:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4291:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4412:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1308:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3516:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.531:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5737:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1916:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2673:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5608:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6575:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1251:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.887:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19041.3920:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2965:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.521:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2604:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.7092:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2486:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2846:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1128:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2546:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6332:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5854:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3271:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.763:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1732:*:*:*:azure:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1665:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4894:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4170:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2913:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1189:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3086:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1611:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6321:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1009:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1849:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2364:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1791:*:*:*:azure:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2130:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.830:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.950:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.709:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3208:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1840:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5247:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19044.2486:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6216:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6456:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3693:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1668:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5965:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5131:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.584:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6093:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19044.3324:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3570:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5487:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.6899:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1085:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3393:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2251:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3448:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19042.2486:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2311:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3087:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3031:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3155:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4780:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.643:*:*:*:*:-:x64:*
Severity Details
CISA KEV Status
Listed in CISA's Known Exploited Vulnerabilities catalog
Weakness Type (CWE)
Use After Free
- Description
- The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations…
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Variant
Key Information
- Published Date
- December 09, 2025
External Resources
Related News Articles
Latest news and updates about CVE-2025-62221
