CVE-2025-48818: Security feature bypass vulnerability

CVE-2025-48818: Security feature bypass vulnerability

CVE-2025-48818 is a security feature bypass vulnerability in Windows BitLocker. The flaw stems from a time-of-check to time-of-use (TOCTOU) race condition, which could allow an attacker with physical access to a target system to bypass BitLocker encryption and access protected data.

Although no public exploit code has been released, Microsoft has assessed the vulnerability as likely to be exploited. The issue is particularly concerning for organizations that rely on BitLocker to safeguard sensitive information on portable or unattended devices. Since the vulnerability requires physical access, remote workers are more susceptible to this attack. Therefore, patching should be prioritized for remote devices.

If you are using Vulnerability Manager Plus or Endpoint Central with the Vulnerability Management add-on, you can check for the presence of this vulnerability in your managed systems. Navigate to the Software Vulnerabilities section under Threats and use the Search by CVE ID search bar to look for CVE-2025-48818. If this vulnerability is detected in any of your systems, you will be able to view details about all the affected systems.


Microsoft released patches for this vulnerability this month as part of its Patch Tuesday Updates.

To resolve this issue, here are the supported patches:

Patch ID

Patch name

Description

41806

Windows10.0-kb5062561-x86-1507.msu

2025-07 Cumulative Update for Windows 10 Version 1507 for x86-based Systems

41805

Windows10.0-kb5062561-x64-1507.msu

2025-07 Cumulative Update for Windows 10 Version 1507 for x64-based Systems

41810

Windows11.0-kb5062570-x64.msu

2025-07 Cumulative Update for Microsoft server operating system version 23H2 for x64-based Systems

41801

Windows10.0-kb5062572-x64-2022.msu

2025-07 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems.

41796

Windows10.0-kb5062554-x64-22H2.msu

2025-07 Cumulative Update for Windows 10 Version 22H2 for x64-based Systems

41795

Windows10.0-kb5062554-x64-21H2.msu

2025-07 Cumulative Update for Windows 10 Version 21H2 for x64-based Systems

41794

Windows10.0-kb5062554-x86-21H2.msu

2025-07 Cumulative Update for Windows 10 Version 21H2 for x86-based Systems

41793

Windows10.0-kb5062554-x86-22H2.msu

2025-07 Cumulative Update for Windows 10 Version 22H2 for x86-based Systems

41804

Windows10.0-kb5062557-x64-2019.msu

2025-07 Cumulative Update for Windows Server 2019 for x64-based Systems

41803

Windows10.0-kb5062557-x86-1809.msu

2025-07 Cumulative Update for Windows 10 Version 1809 for x86-based Systems

41802

Windows10.0-kb5062557-x64-1809.msu

2025-07 Cumulative Update for Windows 10 Version 1809 for x64-based Systems

41813

Windows10.0-kb5062560-x86-1607.msu

2025-07 Cumulative Update for Windows 10 Version 1607 for x86-based Systems

41812

Windows10.0-kb5062560-x64-1607.msu

2025-07 Cumulative Update for Windows 10 Version 1607 for x64-based Systems

41811

Windows10.0-kb5062560-x64-2016.msu

2025-07 Cumulative Update for Windows Server 2016 for x64-based Systems

41800

Windows11.0-kb5062552-arm64-23H2_win11.msu

2025-07 Cumulative Update for Windows 11 Version 23H2 for arm64-based Systems

41799

Windows11.0-kb5062552-x64-23H2_win11.msu

2025-07 Cumulative Update for Windows 11 Version 23H2 for x64-based Systems

41798

Windows11.0-kb5062552-x64-22H2_win11.msu

2025-07 Cumulative Update for Windows 11 Version 22H2 for x64-based Systems

41797

Windows11.0-kb5062552-arm64-22H2_win11.msu

2025-07 Cumulative Update for Windows 11 Version 22H2 for arm64-based Systems

41809

Windows11.0-kb5062553-x64-2025.msu

2025-07 Cumulative Update for Microsoft server operating system version 24H2 for x64-based Systems

41808

Windows11.0-kb5062553-arm64-24H2_win11.msu

2025-07 Cumulative Update for Windows 11 Version 24H2 for arm64-based Systems

41807

Windows11.0-kb5062553-x64-24H2_win11.msu

2025-07 Cumulative Update for Windows 11 Version 24H2 for x64-based Systems

 

Using Patch Manager Plus, Vulnerability Manager Plus, or Endpoint Central, you can deploy these patches. If any patches are missing from your managed systems, go to the Missing Patches section, search for the necessary Patch IDs in the Patch ID column, filter them, and deploy them immediately to protect your systems from this vulnerability.


Cheers,
The ManageEngine team

                  New to ADSelfService Plus?