CVE-2025-7676

DLL hijacking of all PE32 executables on Windows 11 for ARM CPUs

Description

DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs.

Category

5.4
CVSS
Severity: Medium
CVSS 4.0 •
EPSS 0.01%
Affected: Microsoft, Inc Windows 11
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-7676?
CVE-2025-7676 has been scored as a medium severity vulnerability.
How to fix CVE-2025-7676?
To fix CVE-2025-7676, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-7676 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-7676 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-7676?
CVE-2025-7676 affects Microsoft, Inc Windows 11.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.