First published: Tue Mar 11 2025(Updated: )
<p>Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 11 | =23H2 | |
Windows 11 | =24H2 | |
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =23H2 | |
Microsoft Windows Server 2019 | ||
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =24H2 | |
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | ||
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24061 is a protection mechanism failure in Windows Mark of the Web that allows unauthorized attackers to bypass security features locally.
CVE-2025-24061 affects various versions of Windows 10 and Windows 11 including specific releases like 23H2 and 24H2.
To fix CVE-2025-24061, users should ensure they install the latest security patches provided by Microsoft.
The impact of CVE-2025-24061 may allow attackers to gain unauthorized access and perform actions that compromise system security.
Currently, there are no known workaround measures besides applying the appropriate security updates to mitigate CVE-2025-24061.