CVE-2025-59282

📊 7.0 HIGH0.1%🎯 0 exploits
📅 Published Oct 14, 2025
📋 Status: Analyzed

Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally.

🎯 Affected Products & Systems

18 product configurations affected

Filter by type:
💻
Operating System
Vulnerable
Version: < 10.0.10240.21161
CPE:
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.14393.8519
CPE:
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
CPE:
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.19044.6456
CPE:
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.19045.6456
CPE:
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.22621.6060
CPE:
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.22631.6060
CPE:
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26200.6899
CPE:
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: r2
CPE:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: r2
CPE:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.14393.8519
CPE:
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
CPE:
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.20348.4294
CPE:
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
💻
Vulnerable
Version: < 10.0.25398.1913
CPE:
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
18 productsscroll for more
Metrics
7.0 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector:
LOCAL
Complexity:
HIGH
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
7.0 (HIGH)v3.1
EPSS Details
0.1% (Minimal)15.8th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Oct 14, 2025 (18 days ago)
Last Modified
Oct 27, 2025 (5 days ago)
Security Weaknesses3
References2