Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21242: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21242cvecve-2025-21242cwe-200
Published: Tue Jan 14 2025 (01/14/2025, 18:03:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Kerberos Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:05:16 UTC

Technical Analysis

CVE-2025-21242 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability specifically involves the Windows Kerberos authentication protocol, where sensitive information related to Kerberos tickets or authentication data can be disclosed to unauthorized remote attackers. The CVSS 3.1 base score is 5.9, indicating medium severity, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C. This means the attack can be performed remotely over the network without privileges or user interaction but requires high attack complexity, limiting widespread exploitation. The vulnerability impacts confidentiality by allowing attackers to obtain sensitive authentication information, potentially enabling further reconnaissance or indirect attacks. However, it does not affect system integrity or availability. No known exploits are currently reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability is reserved and published by Microsoft, indicating recognition and potential future remediation. The affected Windows 10 version 1507 is an early release from 2015, which is largely out of mainstream support, increasing the risk for organizations still running this legacy version. The technical details suggest that the flaw lies in the handling of Kerberos protocol data, which is critical for secure authentication in Windows environments. Attackers exploiting this vulnerability could gain unauthorized access to sensitive authentication tokens or information, facilitating lateral movement or privilege escalation in complex attack chains.

Potential Impact

For European organizations, the exposure of sensitive Kerberos information can lead to significant security risks, especially in sectors relying heavily on Windows-based authentication such as government, finance, healthcare, and critical infrastructure. Disclosure of Kerberos tickets or authentication data can enable attackers to impersonate users, escalate privileges, or move laterally within networks, potentially leading to data breaches or disruption of services. Although the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can be a stepping stone for more severe attacks. Organizations still operating Windows 10 Version 1507 are particularly vulnerable due to the lack of patches and support. The impact is heightened in environments with weak network segmentation or insufficient monitoring of authentication traffic. European entities with compliance requirements around data protection (e.g., GDPR) may face regulatory consequences if sensitive information is leaked due to this vulnerability. The absence of known exploits in the wild provides a window for proactive mitigation, but the medium severity score indicates that the threat should not be underestimated.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and patched Windows version to eliminate the vulnerability. 2. Implement strict network segmentation to limit exposure of Kerberos authentication traffic to trusted network segments only. 3. Deploy advanced monitoring and anomaly detection tools focused on Kerberos authentication traffic to identify unusual patterns indicative of exploitation attempts. 4. Enforce the use of strong authentication policies and consider multi-factor authentication to reduce the risk of credential misuse. 5. Restrict remote network access to vulnerable systems using firewalls and VPNs with strict access controls. 6. Regularly audit and review domain controller and authentication server logs for signs of suspicious activity. 7. Educate IT and security teams about the vulnerability specifics to ensure timely response and patch deployment once available. 8. Coordinate with Microsoft support channels for updates on patches or workarounds. 9. Consider deploying endpoint detection and response (EDR) solutions capable of detecting Kerberos-related anomalies. 10. Maintain an up-to-date asset inventory to identify and prioritize remediation of systems running the affected Windows version.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.925Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4e9ed239a66badeac1

Added to database: 9/9/2025, 11:50:38 PM

Last enriched: 2/14/2026, 8:05:16 AM

Last updated: 3/24/2026, 8:20:50 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses