Skip to main content

CVE-2025-21242: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-21242cvecve-2025-21242cwe-200
Published: Tue Jan 14 2025 (01/14/2025, 18:03:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kerberos Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:37:51 UTC

Technical Analysis

CVE-2025-21242 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves an information disclosure flaw within the Windows Kerberos authentication protocol implementation. Specifically, this vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The vulnerability allows a remote attacker, without any privileges or user interaction, to potentially gain access to sensitive Kerberos authentication data over the network. The CVSS v3.1 base score is 5.9, reflecting a medium severity due to the high impact on confidentiality but no impact on integrity or availability. The attack vector is network-based (AV:N), but requires high attack complexity (AC:H), meaning exploitation is not trivial and likely requires specific conditions or knowledge. No privileges or user interaction are required (PR:N/UI:N), and the scope remains unchanged (S:U). The vulnerability does not currently have known exploits in the wild, and no patches or mitigations have been linked yet. The exposure of Kerberos information could allow attackers to gather sensitive authentication tokens or tickets, which could be leveraged in subsequent attacks such as lateral movement or privilege escalation within a compromised network environment. Given that Windows 10 Version 1809 is an older release, many organizations may have already migrated to newer versions, but legacy systems or devices still running this version remain at risk. The lack of a patch at the time of publication increases the urgency for organizations to assess their exposure and apply compensating controls.

Potential Impact

For European organizations, the exposure of sensitive Kerberos authentication information can have significant security implications. Kerberos is widely used in enterprise environments for secure authentication and single sign-on, especially within Active Directory domains common in Europe. Disclosure of Kerberos tickets or related authentication data could enable attackers to impersonate users, escalate privileges, or move laterally within networks, potentially compromising critical systems and sensitive data. This risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. Additionally, organizations that have not updated legacy Windows 10 systems may be particularly vulnerable. The medium severity score suggests that while immediate system disruption is unlikely, the confidentiality breach could lead to more severe downstream attacks if combined with other vulnerabilities or misconfigurations. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time.

Mitigation Recommendations

Given the absence of an official patch at the time of this analysis, European organizations should prioritize the following mitigations: 1) Inventory and identify all systems running Windows 10 Version 1809 to understand exposure scope. 2) Where possible, upgrade or migrate affected systems to supported and patched Windows versions to eliminate the vulnerability. 3) Implement network segmentation and strict access controls to limit exposure of Kerberos traffic to trusted network segments only. 4) Employ network monitoring and anomaly detection focused on Kerberos authentication traffic to detect unusual or unauthorized access attempts. 5) Enforce the use of strong encryption and secure channel protocols (e.g., IPsec) to protect Kerberos traffic from interception. 6) Review and tighten Active Directory permissions and audit logs to detect potential misuse of authentication tokens. 7) Educate IT and security teams about this vulnerability to ensure rapid response once patches become available. 8) Consider deploying endpoint detection and response (EDR) solutions capable of identifying suspicious Kerberos-related activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.925Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4e9ed239a66badeac1

Added to database: 9/9/2025, 11:50:38 PM

Last enriched: 9/10/2025, 1:37:51 AM

Last updated: 9/10/2025, 5:06:42 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats