Skip to main content

CVE-2025-21238: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21238cvecve-2025-21238cwe-122
Published: Tue Jan 14 2025 (01/14/2025, 18:04:54 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Telephony Service Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 00:23:25 UTC

Technical Analysis

CVE-2025-21238 is a high-severity heap-based buffer overflow vulnerability (CWE-122) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists within the Windows Telephony Service, a component responsible for telephony-related functions and remote communications. This vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the target system by sending a specially crafted request to the vulnerable service. Exploitation requires no privileges but does require user interaction, such as the user responding to a prompt or notification triggered by the malicious input. The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise, including arbitrary code execution with system-level privileges. The CVSS v3.1 base score is 8.8, reflecting the ease of remote exploitation (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no official patches have been linked yet, indicating that organizations should prioritize mitigation and monitoring. The vulnerability was reserved in December 2024 and published in January 2025, indicating recent discovery and disclosure. Given the affected Windows 10 version 1809 is an older release, many enterprise environments may still be running it, especially in legacy or specialized systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those still operating Windows 10 Version 1809 systems. Successful exploitation could lead to remote code execution, allowing attackers to gain control over affected machines, potentially leading to data breaches, ransomware deployment, or lateral movement within networks. Critical infrastructure, government agencies, healthcare, and financial institutions are particularly at risk due to the sensitive nature of their data and services. The requirement for user interaction slightly reduces the risk of mass automated exploitation but does not eliminate targeted attacks, especially spear-phishing or social engineering campaigns that could trick users into triggering the vulnerability. The lack of available patches increases the urgency for organizations to implement compensating controls. Additionally, the vulnerability could disrupt telephony services, impacting business communications and operational continuity.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting access to the Windows Telephony Service on systems running Windows 10 Version 1809 where telephony functionality is not required. 2. Employ network-level controls such as firewall rules to block inbound traffic to ports and protocols used by the Telephony Service, limiting exposure to untrusted networks. 3. Implement strict user awareness training to reduce the likelihood of successful user interaction exploitation vectors, emphasizing caution with unexpected prompts or communications. 4. Monitor network and endpoint logs for unusual activity related to the Telephony Service or unexpected remote requests. 5. Where possible, upgrade affected systems to a supported and patched version of Windows 10 or later, as Windows 10 Version 1809 is out of mainstream support and unlikely to receive official patches promptly. 6. Apply application whitelisting and endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 7. Prepare incident response plans specifically addressing remote code execution scenarios involving legacy Windows systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.923Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0c0d09ed239a66badfcef

Added to database: 9/10/2025, 12:05:36 AM

Last enriched: 9/10/2025, 12:23:25 AM

Last updated: 9/10/2025, 7:34:30 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats