Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows Subsystem For Linux Gui
|
|
| CPEs | cpe:2.3:a:microsoft:windows_subsystem_for_linux_gui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft windows Subsystem For Linux Gui
|
Fri, 14 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:windows_subsystem_for_linux:*:*:*:*:*:-:*:* |
Wed, 12 Nov 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Microsoft windows Subsystem For Linux |
|
| Vendors & Products |
Microsoft
Microsoft windows Microsoft windows Subsystem For Linux |
Tue, 11 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network. | |
| Title | Windows Subsystem for Linux GUI Remote Code Execution Vulnerability | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-02-26T16:57:27.784Z
Reserved: 2025-10-08T20:10:09.349Z
Link: CVE-2025-62220
Updated: 2025-12-11T15:15:23.656Z
Status : Analyzed
Published: 2025-11-11T18:15:49.730
Modified: 2025-11-14T15:53:43.743
Link: CVE-2025-62220
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:36:33Z