Skip to main content

CVE-2025-21255: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-21255cvecve-2025-21255cwe-125
Published: Tue Jan 14 2025 (01/14/2025, 18:03:35 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Digital Media Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:37:20 UTC

Technical Analysis

CVE-2025-21255 is a medium-severity vulnerability classified as an out-of-bounds read (CWE-125) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability resides in the Windows Digital Media component and allows an attacker with limited privileges (low-level privileges) to read memory outside the intended buffer boundaries. The vulnerability does not require user interaction and can be exploited remotely but requires local privileges (AV:P - adjacent network vector, PR:L - low privileges). The out-of-bounds read can lead to elevation of privilege by leaking sensitive information or causing memory corruption that may be leveraged to execute arbitrary code with higher privileges. The CVSS v3.1 base score is 6.6, indicating a medium severity with high impact on confidentiality, integrity, and availability (all rated high). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on January 14, 2025, and was reserved in December 2024. The lack of patch availability suggests organizations should prioritize mitigation and monitoring until updates are released. The vulnerability's exploitation scope is limited to Windows 10 Version 1809, which is an older but still in-use version of Windows 10, mainly in legacy or specialized environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to enterprises and government agencies that still operate Windows 10 Version 1809 systems. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within networks due to privilege escalation. Confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity and availability impacts could disrupt business operations, particularly in sectors relying on legacy systems such as manufacturing, healthcare, and public administration. Since the vulnerability requires low privileges but no user interaction, insider threats or compromised low-privilege accounts could exploit this vulnerability to escalate privileges and cause further damage. The absence of known exploits currently provides a window for proactive defense, but the medium severity and high impact ratings necessitate urgent attention to prevent future exploitation.

Mitigation Recommendations

1. Immediate inventory and identification of all systems running Windows 10 Version 1809 within the organization. 2. Apply any available security updates or patches from Microsoft as soon as they are released. In the absence of patches, consider temporary mitigations such as disabling or restricting access to the Windows Digital Media component if feasible. 3. Implement strict access controls and monitoring on accounts with low privileges to detect unusual activities that may indicate exploitation attempts. 4. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous memory access patterns or privilege escalation behaviors. 5. Conduct regular security awareness training to reduce insider threat risks and ensure users report suspicious activities promptly. 6. Plan and execute an upgrade strategy to move systems from Windows 10 Version 1809 to supported and patched Windows versions to eliminate exposure to legacy vulnerabilities. 7. Network segmentation to limit the ability of attackers to move laterally if exploitation occurs. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.932Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4e9ed239a66badead6

Added to database: 9/9/2025, 11:50:38 PM

Last enriched: 9/10/2025, 1:37:20 AM

Last updated: 9/10/2025, 4:07:21 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats