Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21200: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21200cvecve-2025-21200cwe-122
Published: Tue Feb 11 2025 (02/11/2025, 17:58:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Telephony Service Remote Code Execution Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:30:55 UTC

Technical Analysis

CVE-2025-21200 is a heap-based buffer overflow vulnerability classified under CWE-122, found in the Windows Telephony Service component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability allows remote attackers to send specially crafted requests to the Telephony Service, triggering a buffer overflow condition on the heap. This overflow can corrupt memory, enabling arbitrary code execution in the context of the affected service. The flaw does not require the attacker to have any privileges (PR:N) but does require user interaction (UI:R), such as the user accepting a call or interaction that triggers the vulnerable code path. The vulnerability affects confidentiality, integrity, and availability, as successful exploitation could allow attackers to execute malicious code remotely, potentially gaining full control over the system. The CVSS v3.1 score of 8.8 indicates high severity, with network attack vector (AV:N), low attack complexity (AC:L), and no privileges required. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component and does not extend beyond the affected system. No patches or updates have been released at the time of publication, and no known exploits are currently observed in the wild. The vulnerability was reserved in December 2024 and published in February 2025, indicating recent discovery. The affected Windows 10 version is the initial release from 2015, which is largely out of mainstream support but may still be in use in legacy environments.

Potential Impact

The potential impact of CVE-2025-21200 is significant for organizations still operating Windows 10 Version 1507. Successful exploitation allows remote code execution without privileges, enabling attackers to fully compromise affected systems. This can lead to data breaches, unauthorized access, disruption of telephony services, and lateral movement within networks. The vulnerability threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution and system modification, and availability by potentially crashing or destabilizing systems. Organizations with exposed telephony services or those that rely on legacy Windows 10 deployments in critical infrastructure, manufacturing, or government sectors face heightened risk. The lack of available patches increases the window of exposure, and once exploit code becomes public, rapid exploitation attempts are likely. This vulnerability could be leveraged in targeted attacks or widespread campaigns, especially against entities that have not upgraded or mitigated the risk.

Mitigation Recommendations

Given the absence of official patches, organizations should take immediate practical steps to mitigate risk. First, disable the Windows Telephony Service if it is not essential to business operations, as this removes the attack surface. If the service is required, restrict network access to it using firewall rules to limit exposure to trusted internal networks only. Employ network segmentation to isolate vulnerable systems from untrusted networks. Monitor telephony service logs and network traffic for anomalous activity indicative of exploitation attempts. Encourage users to be cautious with unsolicited telephony interactions that could trigger the vulnerability. Plan and prioritize upgrading affected systems to a supported Windows 10 version or later, where this vulnerability is not present. Additionally, implement endpoint detection and response (EDR) solutions capable of detecting heap-based buffer overflow exploitation techniques. Maintain regular backups and incident response readiness in case of compromise. Stay alert for vendor updates or security advisories providing patches or further guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.767Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432efc058703ef3fc97f9b

Added to database: 12/17/2025, 10:30:20 PM

Last enriched: 2/26/2026, 11:30:55 PM

Last updated: 3/24/2026, 10:49:56 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses