Out-of-bounds read in Windows Hyper-V allows an authorized attacker to disclose information locally.
References
| Link | Resource |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60706 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 17:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60706 - Vendor Advisory | |
| First Time |
Microsoft windows 11 24h2
Microsoft windows 11 25h2 Microsoft windows Server 2022 Microsoft Microsoft windows Server 2016 Microsoft windows Server 2022 23h2 Microsoft windows 10 1607 Microsoft windows 10 1809 Microsoft windows 10 21h2 Microsoft windows 11 23h2 Microsoft windows 10 22h2 Microsoft windows Server 2019 Microsoft windows Server 2025 |
|
| CPE | cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* |
11 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-11 18:15
Updated : 2025-11-17 17:47
NVD link : CVE-2025-60706
Mitre link : CVE-2025-60706
CVE.ORG link : CVE-2025-60706
JSON object : View
Products Affected
microsoft
- windows_server_2025
- windows_10_1809
- windows_10_22h2
- windows_server_2022_23h2
- windows_server_2019
- windows_server_2022
- windows_10_1607
- windows_11_24h2
- windows_server_2016
- windows_11_23h2
- windows_11_25h2
- windows_10_21h2
CWE
CWE-125
Out-of-bounds Read
