CVE-2025-21299
Published: 14 January 2025
Summary
CVE-2025-21299 is a high-severity Insecure Storage of Sensitive Information (CWE-922) vulnerability in Microsoft Windows 10 1507. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Steal or Forge Kerberos Tickets (T1558); ranked in the top 29.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the Kerberos security feature bypass vulnerability through timely identification, reporting, and application of vendor patches.
Scans Windows systems for the presence of CVE-2025-21299 to enable proactive detection and prioritization for flaw remediation.
Monitors systems for anomalous Kerberos authentication activity indicative of exploitation of the security feature bypass vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Kerberos security feature bypass vulnerability directly facilitates forging or improperly using Kerberos tickets by evading validation mechanisms.
NVD Description
Windows Kerberos Security Feature Bypass Vulnerability
Deeper analysisAI
CVE-2025-21299 is a Windows Kerberos Security Feature Bypass Vulnerability affecting the Kerberos authentication component in Microsoft Windows operating systems. Published on 2025-01-14, it carries a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) and is associated with CWE-922 (Omission of Security-relevant Information) and NVD-CWE-noinfo.
A local attacker with low privileges can exploit this vulnerability through low-complexity means without user interaction. Exploitation enables high-impact confidentiality and integrity violations, allowing bypass of Kerberos security features while maintaining unchanged scope and no availability disruption.
Microsoft's Security Response Center provides an update guide with vulnerability details and mitigation recommendations at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299.
Details
- CWE(s)