⚠️ CISA Known Exploited Vulnerability
Active ThreatThis vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.
CVE-2025-62221
High CISA KEVVulnerability Description
Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
85 configuration(s) from 1 vendor(s)
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2728:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1551:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1486:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2788:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1965:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1913:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1369:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3930:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5011:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5371:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1425:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.7171:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4046:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4651:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4291:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4412:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1308:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3516:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.531:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5737:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1916:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2673:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5608:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6575:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1251:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.887:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19041.3920:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2965:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.521:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2604:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.7092:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2486:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2846:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1128:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2546:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6332:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5854:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3271:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.763:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1732:*:*:*:azure:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1665:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4894:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4170:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2913:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1189:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3086:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1611:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6321:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1009:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1849:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2364:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1791:*:*:*:azure:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2130:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.830:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.950:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.709:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3208:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1840:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5247:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19044.2486:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6216:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6456:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3693:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1668:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5965:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5131:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.584:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.6093:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19044.3324:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3570:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5487:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.6899:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.1085:*:*:*:*:-:x64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3393:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2251:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3448:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19042.2486:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2311:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3087:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3031:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3155:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4780:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:10.0.25398.643:*:*:*:*:-:x64:*
Severity Details
CISA KEV Status
Listed in CISA's Known Exploited Vulnerabilities catalog
Key Information
- Published Date
- December 09, 2025
Related News Articles
Latest news and updates about CVE-2025-62221
