{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T15:25:51.098","vulnerabilities":[{"cve":{"id":"CVE-2025-47972","sourceIdentifier":"secure@microsoft.com","published":"2025-07-08T17:15:37.350","lastModified":"2025-07-14T17:21:11.573","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network."},{"lang":"es","value":"La ejecución concurrente que utiliza un recurso compartido con sincronización incorrecta ('condición de ejecución') en el Editor de métodos de entrada (IME) de Microsoft permite que un atacante autorizado eleve privilegios en una red."}],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":6.0}]},"weaknesses":[{"source":"secure@microsoft.com","type":"Secondary","description":[{"lang":"en","value":"CWE-362"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*","versionEndExcluding":"10.0.10240.21073","matchCriteriaId":"9D58CEDA-0611-4E21-87AF-C368F45BB685"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*","versionEndExcluding":"10.0.10240.21073","matchCriteriaId":"1EEA1F09-0FA7-4946-8005-F0CF177B1103"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*","versionEndExcluding":"10.0.14393.8246","matchCriteriaId":"3CEAC32A-5246-4F6B-8DD5-E49F3BA621DA"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*","versionEndExcluding":"10.0.14393.8246","matchCriteriaId":"E0A0243D-52B4-49AE-B1AE-263640C492B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*","versionEndExcluding":"10.0.17763.7558","matchCriteriaId":"2062C268-282B-4E52-9F8C-876A2D483EAD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*","versionEndExcluding":"10.0.17763.7558","matchCriteriaId":"00FCA704-C6E0-4DE4-86F0-80552527AE53"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19044.6093","matchCriteriaId":"50848190-CF61-47F6-90B8-DB0C120749F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19045.6093","matchCriteriaId":"01E62E99-5EDA-487C-A941-E2DA348B501F"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22621.5624","matchCriteriaId":"76FEE1E8-EB22-4E01-86D7-13B35F9D2876"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22631.5624","matchCriteriaId":"19D0DAB7-4BFF-4BB7-9E0E-B020CF8573C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.4652","matchCriteriaId":"8E866DB2-9CA7-4BCC-8591-9BC94300B779"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.14393.8246","matchCriteriaId":"F6FA4941-0641-4EA0-99A8-97121F625380"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.17763.7558","matchCriteriaId":"DCFD9FA0-D149-422A-975C-582C9BC9024D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.20348.3932","matchCriteriaId":"AE46D39E-7048-4A31-9753-39F6E5F97D1D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.25398.1732","matchCriteriaId":"613302B8-D5C2-4908-9FC9-0EC1650D4517"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.4652","matchCriteriaId":"10E640FB-32AB-45B6-BC42-56CC587C0A35"}]}]}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47972","source":"secure@microsoft.com","tags":["Vendor Advisory"]}]}}]}