{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:13:01.954","vulnerabilities":[{"cve":{"id":"CVE-2025-26649","sourceIdentifier":"secure@microsoft.com","published":"2025-04-08T18:15:48.843","lastModified":"2025-07-10T15:25:14.457","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally."},{"lang":"es","value":"La ejecución concurrente utilizando un recurso compartido con sincronización incorrecta ('condición de ejecución') en Windows Secure Channel permite que un atacante autorizado eleve privilegios localmente."}],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9}]},"weaknesses":[{"source":"secure@microsoft.com","type":"Secondary","description":[{"lang":"en","value":"CWE-362"},{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22621.5189","matchCriteriaId":"640C45C8-83C3-4BBC-9176-705BEAA80E64"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22631.5189","matchCriteriaId":"4CE9402D-6417-4F82-909A-D89C06C98794"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.3775","matchCriteriaId":"ED4B5FB3-A574-4DA6-9A43-0950B121CC92"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.20348.3453","matchCriteriaId":"52706BEC-E3D6-4188-BB88-7078FE4AF970"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.25398.1551","matchCriteriaId":"0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.3775","matchCriteriaId":"99601356-2DEE-482F-BCBC-A5C7D92D2D74"}]}]}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26649","source":"secure@microsoft.com","tags":["Vendor Advisory"]}]}}]}