Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21197: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21197cvecve-2025-21197cwe-284
Published: Tue Apr 08 2025 (04/08/2025, 17:23:36 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:37:31 UTC

Technical Analysis

CVE-2025-21197 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the NTFS file system's handling of directory listings and permissions. Specifically, an authorized attacker with limited privileges can leverage this vulnerability to disclose file path information of files or folders located under directories where the attacker lacks permission to list contents. This means that while the attacker cannot enumerate directory contents, they can still infer or obtain file path details, potentially exposing sensitive directory structures or filenames. The vulnerability does not allow modification or deletion of files (no integrity impact) nor does it cause denial of service (no availability impact). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning it can be exploited remotely over the network with low attack complexity, requires privileges but no user interaction, and impacts confidentiality significantly. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was published on April 8, 2025, and was reserved in December 2024. This issue may be leveraged by attackers for reconnaissance to map directory structures and identify valuable targets for subsequent attacks, especially in environments where sensitive data is stored in protected directories. Since it affects an older Windows 10 version (1507), systems that have not been updated or are running legacy software are at risk.

Potential Impact

For European organizations, the primary impact of CVE-2025-21197 is the unauthorized disclosure of sensitive file path information, which can aid attackers in planning more targeted attacks such as privilege escalation, data exfiltration, or lateral movement. Although the vulnerability does not directly compromise data integrity or system availability, the exposure of directory structures can reveal the presence of critical files or applications, increasing the risk profile. Organizations in sectors like finance, government, healthcare, and critical infrastructure that rely on legacy Windows 10 systems may find this particularly concerning. The vulnerability could facilitate espionage or intellectual property theft by revealing sensitive file locations. Additionally, since the exploit requires only low privileges and no user interaction, insider threats or compromised low-privilege accounts could leverage this flaw to gain valuable intelligence. However, the lack of known exploits in the wild and the medium severity rating suggest the immediate risk is moderate but should not be ignored.

Mitigation Recommendations

To mitigate CVE-2025-21197, European organizations should prioritize upgrading or patching affected Windows 10 Version 1507 systems as soon as official fixes become available from Microsoft. Until patches are released, organizations should: 1) Restrict network access to legacy systems to trusted users only, minimizing exposure to potential attackers. 2) Implement strict access controls and audit permissions on sensitive directories to limit the number of users with even low-level privileges. 3) Monitor file system access logs and employ anomaly detection to identify unusual attempts to access or enumerate file paths. 4) Use endpoint detection and response (EDR) tools to detect suspicious behavior indicative of reconnaissance activities. 5) Educate system administrators and users about the risks of running outdated operating system versions and encourage timely updates. 6) Consider network segmentation to isolate legacy systems from critical infrastructure. 7) Employ application whitelisting and privilege management to reduce the attack surface. These targeted measures go beyond generic advice by focusing on controlling access and monitoring for reconnaissance attempts specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.767Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebae1

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 8:37:31 AM

Last updated: 3/28/2026, 9:18:03 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses