First published: Tue Apr 08 2025(Updated: )
<p>Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 11 | =22H2 | |
Windows 10 | =1809 | |
Windows 11 | =23H2 | |
Windows 11 | =24H2 | |
Microsoft Windows Server 2025 | ||
Windows 10 | =21H2 | |
Windows 11 | =24H2 | |
Windows 11 | =23H2 | |
Windows 10 | =22H2 | |
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2019 | ||
Windows 10 | =22H2 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 11 | =22H2 | |
Microsoft Windows Server 2019 | ||
Windows 10 | =21H2 | |
Windows 10 | =21H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26644 has a medium severity classification due to its ability to allow spoofing attacks on Windows Hello.
To fix CVE-2025-26644, you should apply the appropriate security update provided by Microsoft for your version of Windows.
CVE-2025-26644 affects Windows 10 versions 1809, 21H2, and 22H2, as well as Windows 11 versions 22H2, 23H2, and 24H2.
No, CVE-2025-26644 requires local access for an attacker to exploit the vulnerability.
CVE-2025-26644 allows unauthorized spoofing attacks by manipulating the recognition mechanism of Windows Hello.