Skip to main content

CVE-2025-21197: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-21197cvecve-2025-21197cwe-284
Published: Tue Apr 08 2025 (04/08/2025, 17:23:36 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:05:29 UTC

Technical Analysis

CVE-2025-21197 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Windows NTFS file system's access control mechanisms, where an authorized attacker with limited privileges can disclose file path information within a directory for which they lack permission to list contents. Essentially, this vulnerability allows an attacker to bypass intended access restrictions and gain visibility into folder structures and file paths that should be inaccessible. The vulnerability does not allow modification or deletion of files, nor does it require user interaction to exploit. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity or availability impact (I:N/A:N), and official remediation level (RL:O) with confirmed fix (RC:C). No known exploits are currently reported in the wild, and there are no patch links provided yet. This vulnerability could be leveraged by attackers to gather sensitive information about the file system structure, which may facilitate further targeted attacks or privilege escalation attempts.

Potential Impact

For European organizations, the primary impact of CVE-2025-21197 lies in the potential exposure of sensitive directory and file path information that should be restricted. Disclosure of such information can aid attackers in reconnaissance activities, enabling them to map out critical data storage locations, identify valuable assets, or discover configuration files that could be leveraged in subsequent attacks. While this vulnerability does not directly compromise data integrity or availability, the confidentiality breach can have significant consequences, especially for organizations handling sensitive personal data, intellectual property, or critical infrastructure information. This is particularly relevant under the GDPR framework, where unauthorized disclosure of personal data or system details may lead to compliance violations and regulatory penalties. Additionally, attackers could use the disclosed information to craft more effective phishing or social engineering campaigns targeting European entities. Since the vulnerability requires only low privileges and no user interaction, insider threats or compromised low-level accounts could exploit this flaw to escalate their knowledge of the environment.

Mitigation Recommendations

Given the absence of an official patch link, European organizations should implement compensating controls to mitigate the risk. These include: 1) Restricting access to Windows 10 Version 1809 systems and limiting user privileges to the minimum necessary, especially for accounts that do not require directory listing capabilities. 2) Employing strict network segmentation and access controls to reduce exposure of vulnerable systems. 3) Monitoring file system access logs and unusual directory enumeration attempts to detect potential exploitation attempts. 4) Utilizing endpoint detection and response (EDR) tools to identify suspicious activities related to file system access. 5) Planning and prioritizing an upgrade to a more recent and supported Windows version where this vulnerability is fixed or mitigated. 6) Applying principle of least privilege rigorously and reviewing group policies related to NTFS permissions to ensure no excessive rights are granted. 7) Educating IT staff about the vulnerability and encouraging vigilance for related indicators of compromise. Once Microsoft releases an official patch, immediate deployment should be prioritized.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.767Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebae1

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 3:05:29 AM

Last updated: 8/18/2025, 11:33:56 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats