CVE-2025-21197: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507
Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.
AI Analysis
Technical Summary
CVE-2025-21197 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the NTFS file system's handling of directory listings and permissions. Specifically, an authorized attacker with limited privileges can leverage this vulnerability to disclose file path information of files or folders located under directories where the attacker lacks permission to list contents. This means that while the attacker cannot enumerate directory contents, they can still infer or obtain file path details, potentially exposing sensitive directory structures or filenames. The vulnerability does not allow modification or deletion of files (no integrity impact) nor does it cause denial of service (no availability impact). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning it can be exploited remotely over the network with low attack complexity, requires privileges but no user interaction, and impacts confidentiality significantly. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was published on April 8, 2025, and was reserved in December 2024. This issue may be leveraged by attackers for reconnaissance to map directory structures and identify valuable targets for subsequent attacks, especially in environments where sensitive data is stored in protected directories. Since it affects an older Windows 10 version (1507), systems that have not been updated or are running legacy software are at risk.
Potential Impact
For European organizations, the primary impact of CVE-2025-21197 is the unauthorized disclosure of sensitive file path information, which can aid attackers in planning more targeted attacks such as privilege escalation, data exfiltration, or lateral movement. Although the vulnerability does not directly compromise data integrity or system availability, the exposure of directory structures can reveal the presence of critical files or applications, increasing the risk profile. Organizations in sectors like finance, government, healthcare, and critical infrastructure that rely on legacy Windows 10 systems may find this particularly concerning. The vulnerability could facilitate espionage or intellectual property theft by revealing sensitive file locations. Additionally, since the exploit requires only low privileges and no user interaction, insider threats or compromised low-privilege accounts could leverage this flaw to gain valuable intelligence. However, the lack of known exploits in the wild and the medium severity rating suggest the immediate risk is moderate but should not be ignored.
Mitigation Recommendations
To mitigate CVE-2025-21197, European organizations should prioritize upgrading or patching affected Windows 10 Version 1507 systems as soon as official fixes become available from Microsoft. Until patches are released, organizations should: 1) Restrict network access to legacy systems to trusted users only, minimizing exposure to potential attackers. 2) Implement strict access controls and audit permissions on sensitive directories to limit the number of users with even low-level privileges. 3) Monitor file system access logs and employ anomaly detection to identify unusual attempts to access or enumerate file paths. 4) Use endpoint detection and response (EDR) tools to detect suspicious behavior indicative of reconnaissance activities. 5) Educate system administrators and users about the risks of running outdated operating system versions and encourage timely updates. 6) Consider network segmentation to isolate legacy systems from critical infrastructure. 7) Employ application whitelisting and privilege management to reduce the attack surface. These targeted measures go beyond generic advice by focusing on controlling access and monitoring for reconnaissance attempts specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-21197: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507
Description
Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-21197 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the NTFS file system's handling of directory listings and permissions. Specifically, an authorized attacker with limited privileges can leverage this vulnerability to disclose file path information of files or folders located under directories where the attacker lacks permission to list contents. This means that while the attacker cannot enumerate directory contents, they can still infer or obtain file path details, potentially exposing sensitive directory structures or filenames. The vulnerability does not allow modification or deletion of files (no integrity impact) nor does it cause denial of service (no availability impact). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning it can be exploited remotely over the network with low attack complexity, requires privileges but no user interaction, and impacts confidentiality significantly. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was published on April 8, 2025, and was reserved in December 2024. This issue may be leveraged by attackers for reconnaissance to map directory structures and identify valuable targets for subsequent attacks, especially in environments where sensitive data is stored in protected directories. Since it affects an older Windows 10 version (1507), systems that have not been updated or are running legacy software are at risk.
Potential Impact
For European organizations, the primary impact of CVE-2025-21197 is the unauthorized disclosure of sensitive file path information, which can aid attackers in planning more targeted attacks such as privilege escalation, data exfiltration, or lateral movement. Although the vulnerability does not directly compromise data integrity or system availability, the exposure of directory structures can reveal the presence of critical files or applications, increasing the risk profile. Organizations in sectors like finance, government, healthcare, and critical infrastructure that rely on legacy Windows 10 systems may find this particularly concerning. The vulnerability could facilitate espionage or intellectual property theft by revealing sensitive file locations. Additionally, since the exploit requires only low privileges and no user interaction, insider threats or compromised low-privilege accounts could leverage this flaw to gain valuable intelligence. However, the lack of known exploits in the wild and the medium severity rating suggest the immediate risk is moderate but should not be ignored.
Mitigation Recommendations
To mitigate CVE-2025-21197, European organizations should prioritize upgrading or patching affected Windows 10 Version 1507 systems as soon as official fixes become available from Microsoft. Until patches are released, organizations should: 1) Restrict network access to legacy systems to trusted users only, minimizing exposure to potential attackers. 2) Implement strict access controls and audit permissions on sensitive directories to limit the number of users with even low-level privileges. 3) Monitor file system access logs and employ anomaly detection to identify unusual attempts to access or enumerate file paths. 4) Use endpoint detection and response (EDR) tools to detect suspicious behavior indicative of reconnaissance activities. 5) Educate system administrators and users about the risks of running outdated operating system versions and encourage timely updates. 6) Consider network segmentation to isolate legacy systems from critical infrastructure. 7) Employ application whitelisting and privilege management to reduce the attack surface. These targeted measures go beyond generic advice by focusing on controlling access and monitoring for reconnaissance attempts specific to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-05T21:43:30.767Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebae1
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/14/2026, 8:37:31 AM
Last updated: 3/28/2026, 9:18:03 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.