CVE-2025-59257

📊 6.5 MEDIUM0.2%🎯 0 exploits
📅 Published Oct 14, 2025
📋 Status: Analyzed

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

🎯 Affected Products & Systems

4 product configurations affected

Filter by type:
💻
Operating System
Vulnerable
Version: < 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26200.6899
CPE:
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
💻
Vulnerable
Version: < 10.0.25398.1913
CPE:
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Metrics
6.5 MEDIUMCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
LOW
User Interaction:
NONE
Confidentiality:
NONE
Integrity:
NONE
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
6.5 (MEDIUM)v3.1
EPSS Details
0.2% (Minimal)39.2th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Oct 14, 2025 (18 days ago)
Last Modified
Oct 20, 2025 (12 days ago)
Security Weaknesses1
References2