MSRC compact vulnerability detail

CVE-2025-29833 · Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally.

Severity
Critical
Impact
Remote Code Execution
CVSS
7.7 base · 6.7 temporal
Release
2025-05-13
Signals
Windows Virtual Machine Bus Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally.
FAQ / Articles
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability.
Windows Virtual Machine Bus Remote Code Execution Vulnerability
Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally.
FAQ
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.
Windows VMSwitch Remote Code Execution Vulnerability
Time-of-check time-of-use (toctou) race condition in Windows VMSwitch allows an authorized attacker to execute code locally.
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition.