Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21217: CWE-693: Protection Mechanism Failure in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21217cvecve-2025-21217cwe-693
Published: Tue Jan 14 2025 (01/14/2025, 18:04:13 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows NTLM Spoofing Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:00:05 UTC

Technical Analysis

CVE-2025-21217 identifies a protection mechanism failure in Microsoft Windows 10 Version 1507 related to NTLM authentication spoofing, categorized under CWE-693. NTLM (NT LAN Manager) is a legacy authentication protocol used in Windows environments for network authentication. This vulnerability allows an unauthenticated attacker to spoof NTLM authentication requests, potentially tricking a system or user into revealing sensitive authentication tokens or credentials. The vulnerability affects the initial release version of Windows 10 (build 10240.0), which lacks modern mitigations present in later versions. The CVSS 3.1 score of 6.5 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). This means attackers can potentially intercept or spoof authentication data, compromising confidentiality without altering data or disrupting services. No known exploits have been reported in the wild, and no patches have been published yet, indicating the vulnerability is newly disclosed. The root cause is a failure in the protection mechanism design or implementation (CWE-693), suggesting that the NTLM protocol handling in this Windows version does not adequately prevent spoofing attacks. This vulnerability could be exploited in scenarios where users connect to malicious or compromised network resources, leading to credential theft or unauthorized access. The lack of patches necessitates immediate mitigation through configuration changes and upgrading to supported Windows versions with improved security controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of authentication credentials, especially in environments still running Windows 10 Version 1507. Attackers exploiting this flaw could impersonate legitimate users or services by spoofing NTLM authentication, potentially gaining unauthorized access to sensitive systems or data. This is particularly concerning for sectors with high-value targets such as finance, government, healthcare, and critical infrastructure, where credential theft can lead to broader network compromise or data breaches. The vulnerability does not affect system integrity or availability directly but can facilitate lateral movement and privilege escalation if combined with other exploits. Since Windows 10 Version 1507 is an early release, some legacy systems in Europe may still operate it, especially in organizations with slow upgrade cycles or embedded systems. The requirement for user interaction means phishing or social engineering could be used to trigger exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details are public. Overall, the impact is moderate but with potential for serious confidentiality breaches in targeted attacks.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement specific mitigations to reduce exposure. First, disable NTLM authentication where possible, especially on network segments exposed to untrusted users or devices. Enforce SMB signing and extended protection for authentication to prevent NTLM relay and spoofing attacks. Employ network segmentation and firewall rules to restrict NTLM traffic to trusted systems only. Educate users about the risks of connecting to unknown or untrusted network resources to reduce the likelihood of user interaction exploitation. Upgrade affected systems from Windows 10 Version 1507 to the latest supported Windows versions that include security improvements and patches for NTLM-related vulnerabilities. Use multi-factor authentication (MFA) to reduce the impact of credential theft. Monitor network traffic for unusual NTLM authentication attempts and implement intrusion detection systems tuned to detect NTLM spoofing patterns. Finally, maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.771Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4d9ed239a66badea74

Added to database: 9/9/2025, 11:50:37 PM

Last enriched: 2/14/2026, 8:00:05 AM

Last updated: 3/29/2026, 8:44:14 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses