MSRC compact vulnerability detail

CVE-2025-21320 · Windows Kernel Memory Information Disclosure Vulnerability

No description was published by MSRC.

Severity
Important
Impact
Information Disclosure
CVSS
5.5 base · 4.8 temporal
Release
2025-01-14
Signals
Windows Kernel Memory Information Disclosure Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ
What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.
FAQ
**Are there any further steps I need to take to be protected from this vulnerability? Customers running Windows Server 2016 or older, or Windows 10 version 1607 or older MUST install both the Servicing Stack Update (SSU) and the Security Update for that version to be fully protected from this vulnerability. See ADV990001 | Latest Servicing Stack Updates for the applicable Servicing Stack Update for your operating system version. Customers whose systems are configured to receive automatic updates do not need to take any further action. Do I need to install the Servicing Stack Update and the January 2025 Security Update in any particular order? SSUs should always be installed before any new update for Windows, including the latest cumulative update (LCU), Monthly Rollup, or Security Update.