{"id":"CVE-2025-47981","details":"Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.","modified":"2026-03-15T21:45:04.256308Z","published":"2025-07-08T17:15:38.633Z","references":[{"type":"ADVISORY","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47981"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/cve-2025-47981-mitigation-script-heap-based-buffer-overflow-in-windows-spnego-extended-negotiation"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/cve-2025-47981-detection-script-heap-based-buffer-overflow-in-windows-spnego-extended-negotiation"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"10.0.10240.21073"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.10240.21073"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.8246"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.8246"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7558"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7558"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19044.6093"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19045.6093"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22621.5624"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22631.5624"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.4652"}]},{"events":[{"introduced":"0"},{"last_affected":"r2-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"r2"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.8246"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7558"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.20348.3932"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.25398.1732"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.4652"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-47981.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}