HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Local Denial‑of‑Service Vulnerability (CVE‑2025‑47987) Disrupts Windows 11 23H2 Systems

A publicly disclosed exploit (CVE‑2025‑47987) can crash the LSASS process on Windows 11 23H2, causing a denial‑of‑service condition. The flaw affects any organization running the OS, making patching and local‑privilege controls a priority for third‑party risk management.

LiveThreat™ Intelligence · 📅 April 30, 2026· 📰 exploit-db.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
exploit-db.com

Local Denial‑of‑Service Vulnerability (CVE‑2025‑47987) Disrupts Windows 11 23H2 Systems

What Happened — A publicly‑available exploit (EDB‑52541) triggers a kernel‑level denial‑of‑service condition in Windows 11 version 23H2 (CVE‑2025‑47987). The exploit crafts a malformed Kerberos certificate logon buffer that crashes the Local Security Authority Subsystem Service (LSASS), rendering the host unresponsive.

Why It Matters for TPRM

  • Critical OS flaw can be leveraged by any malicious insider or compromised local account to halt business‑critical workloads.
  • Vendors that ship Windows‑based appliances, VDI solutions, or managed desktop services inherit this risk.
  • Lack of immediate patching may lead to service‑level agreement (SLA) breaches and downstream supply‑chain impact.

Who Is Affected — Enterprises across all sectors that run Windows 11 23H2 on desktops, laptops, or as the OS layer for virtualized workloads; MSPs and MSSPs delivering managed Windows environments.

Recommended Actions

  • Verify that all Windows 11 endpoints are patched to the latest cumulative update (addressing CVE‑2025‑47987).
  • If patching cannot be applied immediately, implement compensating controls: restrict local admin rights, enforce application whitelisting, and monitor LSASS stability via endpoint detection and response (EDR).
  • Review contracts with third‑party service providers that rely on Windows 11 for critical services; require proof of remediation.

Technical Notes — The exploit abuses a buffer‑building routine in the Kerberos authentication stack, causing an out‑of‑bounds write that crashes LSASS. No remote network vector; the attack requires local code execution. CVE‑2025‑47987 is rated High by Microsoft. Source: Exploit‑DB 52541

📰 Original Source
https://www.exploit-db.com/exploits/52541

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.