First published: Tue Apr 08 2025(Updated: )
<p>Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | =22H2 | |
Microsoft Windows Server 2022 | ||
Windows 10 | =21H2 | |
Windows 11 | =24H2 | |
Windows 10 | =22H2 | |
Windows 11 | =23H2 | |
Windows 10 | =21H2 | |
Windows 11 | =23H2 | |
Windows 10 | =21H2 | |
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2025 | ||
Windows 10 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =24H2 | |
Windows 11 | =22H2 | |
Microsoft Windows Server 2022 | ||
=23H2 | ||
=23H2 | ||
=22H2 | ||
=22H2 | ||
=22H2 | ||
=22H2 | ||
=22H2 | ||
=21H2 | ||
=21H2 | ||
=21H2 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27490 has been classified as a high severity vulnerability due to its potential to allow privilege escalation.
CVE-2025-27490 affects various versions of Windows 10, Windows 11, and Windows Server, including specific system versions like 22H2 and 24H2.
To remediate CVE-2025-27490, install the relevant security updates provided by Microsoft for your affected product version.
The impact of CVE-2025-27490 allows an attacker to execute arbitrary code at a higher privilege level, potentially compromising the system.
As of the last update, there is no public indication that CVE-2025-27490 is actively being exploited, but it is recommended to apply the patch as a precaution.