First published: Tue Apr 08 2025(Updated: )
<p>Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 11 | =23H2 | |
Windows 10 | =1809 | |
Windows 11 | =23H2 | |
Windows 10 | =22H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Windows 10 | =21H2 | |
Windows 10 | =22H2 | |
Windows 11 | =22H2 | |
Microsoft Windows Server 2022 23H2 | ||
Windows 10 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =22H2 | |
Windows 10 | =21H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1809 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26635 is classified as a high severity vulnerability due to its impact on security features in Windows Hello.
To fix CVE-2025-26635, install the latest patches provided by Microsoft for the affected Windows versions.
CVE-2025-26635 affects Windows 10 versions 21H2, 22H2, 1809, Windows 11 version 22H2, and various Windows Server versions.
CVE-2025-26635 is a security feature bypass vulnerability allowing unauthorized access over a network.
Yes, CVE-2025-26635 can potentially allow unauthorized attackers to bypass security measures and access sensitive data.