INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology / Cybersecurity CRITICAL 1h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 2h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 6h Global malware Technology and Cloud Services HIGH 6h Global vulnerability Information Technology / Cybersecurity CRITICAL 1h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 2h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 6h Global malware Technology and Cloud Services HIGH 6h Global vulnerability Information Technology / Cybersecurity CRITICAL 1h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 2h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 6h Global malware Technology and Cloud Services HIGH 6h
Vulnerabilities

CVE-2025-24984

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Windows NTFS Information Disclosure Vulnerability (CVE-2025-24984)
Published: Mar 11, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Windows NTFS Information Disclosure Vulnerability — Microsoft Windows New Technology File System (NTFS) contains an insertion of sensitive Information into log file vulnerability that allows an unauthorized attacker to disclose information with a physical attack. An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.

🤖 AI Executive Summary

Microsoft Windows NTFS contains a vulnerability allowing unauthorized disclosure of sensitive information through physical access, potentially exposing heap memory contents. This critical flaw requires physical attack vector but poses significant risk to confidential data stored on Windows systems.

📄 Description (Arabic)

ثغرة في نظام ملفات NTFS بـ Windows تسمح بإدراج معلومات حساسة في ملفات السجل، مما يمكن المهاجم من الوصول المادي من قراءة أجزاء من ذاكرة الكومة. يتطلب هذا الاستغلال وصولاً فيزيائياً مباشراً للنظام لكنه قد يؤدي إلى كشف بيانات حساسة جداً.

🤖 ملخص تنفيذي (AI)

نظام ملفات NTFS في Windows يحتوي على ثغرة تسمح بكشف المعلومات الحساسة من خلال الوصول المادي، مما قد يعرض محتويات ذاكرة الكومة. هذا العيب الحرج يتطلب وصولاً فيزيائياً لكن يشكل خطراً كبيراً على البيانات السرية المخزنة على أنظمة Windows.

🤖 AI Intelligence Analysis Analyzed: Apr 15, 2026 11:00
🇸🇦 Saudi Arabia Impact Assessment
Saudi Relevance: high
🏢 Affected Saudi Sectors
banking government healthcare energy telecom
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
Apply Microsoft security updates immediately. Implement physical security controls to restrict unauthorized access to systems. Enable BitLocker encryption on sensitive systems. Monitor system logs for suspicious access patterns. Restrict physical access to servers and workstations in secure facilities.
🔧 خطوات المعالجة (العربية)
تطبيق تحديثات الأمان من Microsoft فوراً. تنفيذ ضوابط الأمان المادي لتقييد الوصول غير المصرح. تفعيل تشفير BitLocker على الأنظمة الحساسة. مراقبة سجلات النظام للأنماط المريبة. تقييد الوصول المادي للخوادم والمحطات في المرافق الآمنة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2.1 3.1 4.2
🔵 SAMA CSF
ID.AM-2 PR.AC-1 PR.PT-2
🟡 ISO 27001:2022
A.6.1.1 A.9.1.1 A.11.1.1
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Windows
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS4.97%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-04-01
Published 2025-03-11
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.