Cyber Posture

CVE-2025-62456

High

Published: 09 December 2025

Published
09 December 2025
Modified
12 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Heap-based buffer overflow in Windows Resilient File System (ReFS) allows an authorized attacker to execute code over a network.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates identification, reporting, and timely remediation of flaws like the heap-based buffer overflow in Windows ReFS via patching.

prevent

Implements memory protection mechanisms such as DEP and ASLR that directly mitigate exploitation of heap-based buffer overflows.

prevent

Requires validation of information inputs to ReFS over the network to prevent buffer overflows from malformed file system operations.

Security SummaryAI

CVE-2025-62456 is a heap-based buffer overflow vulnerability, classified under CWE-122, affecting the Windows Resilient File System (ReFS). This flaw resides in a core component of Windows systems that support ReFS, a Microsoft file system designed for resilience and scalability. The vulnerability was published on 2025-12-09 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility and significant impact potential.

An authorized attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables arbitrary code execution, granting high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U).

The Microsoft Security Response Center provides an update guide for CVE-2025-62456 at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62456, which addresses mitigation and patching details.

Details

CWE(s)

Affected Products

microsoft
windows 11 23h2
≤ 10.0.22631.6345
microsoft
windows 11 24h2
≤ 10.0.26100.7392
microsoft
windows 11 25h2
≤ 10.0.26200.7392
microsoft
windows server 2022
≤ 10.0.20348.4467
microsoft
windows server 2022 23h2
≤ 10.0.25398.2025
microsoft
windows server 2025
≤ 10.0.26100.7392

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Heap-based buffer overflow in ReFS allows low-privileged remote authenticated attacker to achieve arbitrary code execution, directly mapping to Exploitation for Privilege Escalation (T1068) and Exploitation of Remote Services (T1210).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References