vulnerability
Microsoft CVE-2025-55248: .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:H/Au:S/C:C/I:N/A:N) | Oct 14, 2025 | Oct 14, 2025 | Oct 30, 2025 |
Severity
5
CVSS
(AV:N/AC:H/Au:S/C:C/I:N/A:N)
Published
Oct 14, 2025
Added
Oct 14, 2025
Modified
Oct 30, 2025
Description
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.
Solutions
msft-kb5066128-5882713f-e0c4-41f4-b6a4-7a998bb8b801msft-kb5066129-5bd03703-52d3-473f-bb13-88bbc101ce8amsft-kb5066130-5b44dbae-2110-4889-a1f6-ea384daa2e7fmsft-kb5066130-be85d74e-7175-4e47-a3c4-cf2daaaea24emsft-kb5066130-cdd94c7e-e8a7-4fe9-993a-5ab073faa453msft-kb5066130-fdb26191-1d06-48d6-9a36-34af2bac09a8msft-kb5066131-6ac03546-d113-43a9-a1ab-7c2c40bc1595msft-kb5066131-f581fd07-5d4f-4cd1-97ea-24775dfda5c1msft-kb5066133-90d531fb-0611-4ef7-a325-088877de8598msft-kb5066133-9d487b46-07fb-41d1-bb91-b4870eab87b1msft-kb5066134-117737c2-b1b4-4c43-a0a4-e362e095b502msft-kb5066135-0a054815-54a7-4a33-8f14-558c9f2a4407msft-kb5066135-36cdfdee-74f4-4c3e-bf8d-162d319cd30bmsft-kb5066135-75a9d1f0-2a4b-4268-9360-9a5ce15733d8msft-kb5066135-8d115736-17eb-466a-b682-10c5b4852c40msft-kb5066136-5a69e96b-7762-4056-8db1-50031faf5aa6msft-kb5066136-5c9eca14-dee3-4d2a-961e-1058cb6101demsft-kb5066136-fdde09c4-c4df-4557-8b6f-7e0845096eb7msft-kb5066137-92747858-4d1f-48f6-9a03-2d44a914a9dcmsft-kb5066137-a35fe8c8-a942-4a29-b587-a186edb16538msft-kb5066137-bb91d363-3d78-4c34-9344-8ec2ea112905msft-kb5066138-51418a05-484f-413c-a724-94ce5b376741msft-kb5066139-17552663-8607-4e8b-ab3e-a807b06926camsft-kb5066140-a7300f72-3f42-4b8c-87d4-6e86416f0339msft-kb5066141-f371626d-8562-4df1-8ffc-aa2713a333a3msft-kb5066143-35f00f61-d807-4036-ba7c-829adc5a11e3msft-kb5066143-399f9249-663a-4d53-80d7-e42f943428aemsft-kb5066143-ee48ab8e-165a-4668-ab51-c6ef4b69949dmsft-kb5066144-f8abe69c-b854-4259-ab84-a00ac48174c7msft-kb5066145-cfb4d700-a62e-4a03-8be3-d74c9487b5efmsft-kb5066146-5f3a2a90-a682-435f-8c39-97b3b57ec6d2msft-kb5066146-9251128b-4a56-490d-98ba-837bec9d9929msft-kb5066146-b7a12f27-97ba-497e-aaf7-cfbb76ff7d17msft-kb5066148-5f79dffb-3011-4b73-89c2-a79d13042e55msft-kb5066149-12902ad3-3dac-4519-8cda-0f2554a90950msft-kb5066149-2bfd53e5-0b4d-4d54-b3a4-6ea301a02df4msft-kb5066150-a0682081-eb57-4750-9395-41cb825275b3msft-kb5066151-68f44947-0cc8-4ce2-a772-8847a0935409
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.