First published: Tue Apr 08 2025(Updated: )
<p>Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2022 23H2 | ||
Windows 10 | =22H2 | |
Windows 11 | =24H2 | |
Windows 11 | =22H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2016 | ||
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Microsoft Windows Server 2025 | ||
Windows 11 | =23H2 | |
Microsoft Windows Server 2012 R2 | ||
Windows 11 | =22H2 | |
Microsoft Windows Server 2022 | ||
Windows 10 | =21H2 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2019 | ||
Windows 10 | =1809 | |
Windows 11 | =23H2 | |
Windows 10 | =21H2 | |
Microsoft Windows Server 2016 | ||
Windows 11 | =24H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 | =1809 | |
Windows 10 | ||
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26637 has a critical severity rating due to its potential to allow unauthorized access to sensitive data.
To fix CVE-2025-26637, apply the latest security updates provided by Microsoft for the affected Windows products.
CVE-2025-26637 affects multiple versions of Windows, including Windows 10, Windows 11, and Windows Server 2022.
An attacker exploiting CVE-2025-26637 can bypass BitLocker security, potentially gaining unauthorized access to encrypted data.
As of now, Microsoft recommends applying the security patches as the primary solution and has not listed alternate workarounds for CVE-2025-26637.