First published: Tue Feb 11 2025(Updated: )
Microsoft Digest Authentication Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2016 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows 11 | =24H2 | |
Microsoft Windows 11 | =24H2 | |
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows 10 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =21H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21369 has been classified with a high severity level due to its potential to allow remote code execution.
To fix CVE-2025-21369, users should apply the appropriate security patches provided by Microsoft for their affected product.
CVE-2025-21369 affects multiple Microsoft products including Windows Server 2016, Windows 10, and Windows Server 2022 among others.
CVE-2025-21369 is exploited through the Microsoft Digest Authentication process, allowing attackers to execute arbitrary code remotely.
While patches are the primary remedy, disabling Digest Authentication may serve as a temporary workaround until updates are applied.