// For flags

CVE-2025-53156

Windows Storage Port Driver Information Disclosure Vulnerability

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally.

This vulnerability allows local attackers to disclose sensitive information on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Windows Storage Port Driver. The issue results from an exposed dangerous function. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.

*Credits: Angelboy (@scwuaptx) from DEVCORE Research Team
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-06-26 CVE Reserved
  • 2025-08-12 CVE Published
  • 2025-08-18 EPSS Updated
  • 2025-08-26 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Windows Server 2025 (Server Core Installation)
Search vendor "Microsoft" for product "Windows Server 2025 (Server Core Installation)"
>= 10.0.26100.0 < 10.0.26100.4946
Search vendor "Microsoft" for product "Windows Server 2025 (Server Core Installation)" and version " >= 10.0.26100.0 < 10.0.26100.4946"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2022, 23H2 Edition (Server Core Installation)
Search vendor "Microsoft" for product "Windows Server 2022, 23H2 Edition (Server Core Installation)"
>= 10.0.25398.0 < 10.0.25398.1791
Search vendor "Microsoft" for product "Windows Server 2022, 23H2 Edition (Server Core Installation)" and version " >= 10.0.25398.0 < 10.0.25398.1791"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows 11 Version 24H2
Search vendor "Microsoft" for product "Windows 11 Version 24H2"
>= 10.0.26100.0 < 10.0.26100.4946
Search vendor "Microsoft" for product "Windows 11 Version 24H2" and version " >= 10.0.26100.0 < 10.0.26100.4946"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2025
Search vendor "Microsoft" for product "Windows Server 2025"
>= 10.0.26100.0 < 10.0.26100.4946
Search vendor "Microsoft" for product "Windows Server 2025" and version " >= 10.0.26100.0 < 10.0.26100.4946"
en
Affected