CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Lifecycle Timeline
1DescriptionNVD
Improper input validation in Windows Hello allows an unauthorized attacker to bypass a security feature over a network.
AnalysisAI
Windows Hello authentication bypass on Server 2016-2025 allows unauthenticated remote attackers to circumvent biometric/PIN security mechanisms over a network despite high attack complexity. CVSS 8.7 (Critical) with scope change indicates potential lateral movement from compromised Hello authentication into broader Windows security context. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify all Windows Server 2016, 2019, 2022, and 2025 instances in your environment and document current build versions. Within 7 days: Apply vendor-released patches to all affected systems-build 10.0.14393.9060 (Server 2016), 10.0.17763.8644 (Server 2019), 10.0.20348.5020 (Server 2022), 10.0.25398.2274 (Server 2022 23H2), and 10.0.26100.32690 (Server 2025). …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-22481
GHSA-6qx2-q8q2-jv3c