CVE-2025-53156
Windows Storage Port Driver Information Disclosure Vulnerability
Severity Score
5.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally.
This vulnerability allows local attackers to disclose sensitive information on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Windows Storage Port Driver. The issue results from an exposed dangerous function. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.
*Credits:
Angelboy (@scwuaptx) from DEVCORE Research Team
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-06-26 CVE Reserved
- 2025-08-12 CVE Published
- 2025-08-18 EPSS Updated
- 2025-08-26 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53156 | 2025-08-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows Server 2025 (Server Core Installation) Search vendor "Microsoft" for product "Windows Server 2025 (Server Core Installation)" | >= 10.0.26100.0 < 10.0.26100.4946 Search vendor "Microsoft" for product "Windows Server 2025 (Server Core Installation)" and version " >= 10.0.26100.0 < 10.0.26100.4946" | en |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2022, 23H2 Edition (Server Core Installation) Search vendor "Microsoft" for product "Windows Server 2022, 23H2 Edition (Server Core Installation)" | >= 10.0.25398.0 < 10.0.25398.1791 Search vendor "Microsoft" for product "Windows Server 2022, 23H2 Edition (Server Core Installation)" and version " >= 10.0.25398.0 < 10.0.25398.1791" | en |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 11 Version 24H2 Search vendor "Microsoft" for product "Windows 11 Version 24H2" | >= 10.0.26100.0 < 10.0.26100.4946 Search vendor "Microsoft" for product "Windows 11 Version 24H2" and version " >= 10.0.26100.0 < 10.0.26100.4946" | en |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2025 Search vendor "Microsoft" for product "Windows Server 2025" | >= 10.0.26100.0 < 10.0.26100.4946 Search vendor "Microsoft" for product "Windows Server 2025" and version " >= 10.0.26100.0 < 10.0.26100.4946" | en |
Affected
|