CVE-2025-59208

📊 7.1 HIGH0.1%🎯 0 exploits
📅 Published Oct 14, 2025
📋 Status: Analyzed

Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.

🎯 Affected Products & Systems

22 product configurations affected

Filter by type:
💻
Operating System
Vulnerable
Version: < 10.0.10240.21161
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: < 10.0.10240.21161
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: < 10.0.14393.8519
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: < 10.0.14393.8519
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: < 10.0.19044.6456
CPE:
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.19045.6456
CPE:
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.22621.6060
CPE:
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.22631.6060
CPE:
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26200.6899
CPE:
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: All versions
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: All versions
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: r2
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: r2
CPE:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.14393.8519
CPE:
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
CPE:
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.20348.4294
CPE:
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
💻
Vulnerable
Version: < 10.0.25398.1913
CPE:
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
22 productsscroll for more
Metrics
7.1 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
LOW
Availability:
NONE
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
7.1 (HIGH)v3.1
EPSS Details
0.1% (Minimal)15.6th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Oct 14, 2025 (17 days ago)
Last Modified
Oct 17, 2025 (14 days ago)
Security Weaknesses1
References2