Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22933 | DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 29 Jul 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows 11 |
|
| Vendors & Products |
Microsoft
Microsoft windows 11 |
Mon, 28 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 28 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs. | |
| Title | DLL hijacking of all PE32 executables on Windows 11 for ARM CPUs | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Dragos
Published:
Updated: 2025-07-28T17:18:40.248Z
Reserved: 2025-07-15T14:39:26.161Z
Link: CVE-2025-7676
Updated: 2025-07-28T17:18:15.266Z
Status : Awaiting Analysis
Published: 2025-07-28T17:15:34.303
Modified: 2025-07-29T14:14:29.590
Link: CVE-2025-7676
No data.
OpenCVE Enrichment
Updated: 2025-07-29T07:59:28Z
EUVD