CVE-2025-29842
EUVD-2025-1442313.05.2025, 17:15
Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| microsoft | windows_10_1507 | 𝑥 < 10.0.10240.21014 |
| microsoft | windows_10_1507 | 𝑥 < 10.0.10240.21014 |
| microsoft | windows_10_1607 | 𝑥 < 10.0.14393.8066 |
| microsoft | windows_10_1607 | 𝑥 < 10.0.14393.8066 |
| microsoft | windows_10_1809 | 𝑥 < 10.0.17763.7314 |
| microsoft | windows_10_1809 | 𝑥 < 10.0.17763.7314 |
| microsoft | windows_10_21h2 | 𝑥 < 10.0.19044.5854 |
| microsoft | windows_10_21h2 | 𝑥 < 10.0.19044.5854 |
| microsoft | windows_10_21h2 | 𝑥 < 10.0.19044.5854 |
| microsoft | windows_10_22h2 | 𝑥 < 10.0.19045.5854 |
| microsoft | windows_10_22h2 | 𝑥 < 10.0.19045.5854 |
| microsoft | windows_10_22h2 | 𝑥 < 10.0.19045.5854 |
| microsoft | windows_11_22h2 | 𝑥 < 10.0.22621.5335 |
| microsoft | windows_11_22h2 | 𝑥 < 10.0.22621.5335 |
| microsoft | windows_11_23h2 | 𝑥 < 10.0.22631.5335 |
| microsoft | windows_11_23h2 | 𝑥 < 10.0.22631.5335 |
| microsoft | windows_11_24h2 | 𝑥 < 10.0.26100.4061 |
| microsoft | windows_11_24h2 | 𝑥 < 10.0.26100.4061 |
| microsoft | windows_server_2016 | 𝑥 < 10.0.14393.8066 |
| microsoft | windows_server_2019 | 𝑥 < 10.0.17763.7314 |
| microsoft | windows_server_2022 | 𝑥 < 10.0.20348.3692 |
| microsoft | windows_server_2022_23h2 | 𝑥 < 10.0.25398.1611 |
| microsoft | windows_server_2025 | 𝑥 < 10.0.26100.4061 |
𝑥
= Vulnerable software versions
Windows Releases
Platform | Version | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Windows 10 |
| ||||||||||
| Windows 11 |
| ||||||||||
| Windows Server 2016 |
| ||||||||||
| Windows Server 2019 |
| ||||||||||
| Windows Server 2022 |
| ||||||||||
| Windows Server 2025 |
|
Common Weakness Enumeration
- CWE-349 - Acceptance of Extraneous Untrusted Data With Trusted DataThe software, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
- CWE-345 - Insufficient Verification of Data AuthenticityThe software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.