Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21224: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows 10 Version 21H2

0
High
VulnerabilityCVE-2025-21224cvecve-2025-21224cwe-591cwe-416
Published: Tue Jan 14 2025 (01/14/2025, 18:04:22 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 21H2

Description

Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:31:40 UTC

Technical Analysis

CVE-2025-21224 is a vulnerability identified in the Windows Line Printer Daemon (LPD) Service on Windows 10 Version 21H2 (build 10.0.19044.0). The root cause is improper locking of sensitive data in memory (CWE-591), which can allow an attacker to execute remote code. The LPD service, which facilitates printing over a network using the Line Printer Daemon protocol, is exposed to network-based attacks. This vulnerability does not require any privileges or user interaction, but the attack complexity is high, meaning exploitation requires specific conditions or knowledge. The CVSS v3.1 base score is 8.1, reflecting high confidentiality, integrity, and availability impacts if exploited. The vulnerability was reserved in December 2024 and published in January 2025. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation relies on configuration changes or network controls for now. The vulnerability tags include CWE-591 (Sensitive Data Storage in Improperly Locked Memory) and CWE-416 (Use After Free), suggesting memory management flaws that could lead to arbitrary code execution. This vulnerability is critical for environments where the LPD service is enabled and exposed, particularly in enterprise and industrial settings.

Potential Impact

If exploited, this vulnerability could allow remote attackers to execute arbitrary code on affected Windows 10 systems without authentication or user interaction. This could lead to full system compromise, including unauthorized access to sensitive data, disruption of printing services, and potential lateral movement within networks. The high impact on confidentiality, integrity, and availability means attackers could steal or manipulate sensitive information, disrupt business operations, or deploy malware such as ransomware. Organizations relying on Windows 10 21H2 with LPD enabled, especially those exposing this service to untrusted networks, face significant risk. The lack of current exploits reduces immediate threat but also means attackers may develop exploits once patches are released or details become public. Critical infrastructure, government, healthcare, and large enterprises with extensive Windows 10 deployments are particularly vulnerable to targeted attacks leveraging this flaw.

Mitigation Recommendations

Until official patches are released, organizations should disable the Windows LPD service if it is not essential. For environments requiring LPD, restrict network access to the service using firewalls or network segmentation to trusted hosts only. Monitor network traffic for unusual activity targeting the LPD port (typically TCP 515). Employ endpoint detection and response (EDR) tools to detect anomalous behavior indicative of exploitation attempts. Keep Windows 10 systems updated with the latest security patches and monitor Microsoft advisories for the release of a patch addressing CVE-2025-21224. Conduct vulnerability scanning and penetration testing to identify exposed LPD services. Educate IT staff about this vulnerability to ensure rapid response once patches are available. Consider alternative secure printing protocols or services that do not expose similar risks. Implement strict access controls and least privilege principles to limit potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.918Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386826182aa0cae2801b82

Added to database: 5/29/2025, 1:59:02 PM

Last enriched: 2/26/2026, 11:31:40 PM

Last updated: 3/24/2026, 10:45:26 PM

Views: 179

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses