Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21257: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2025-21257cvecve-2025-21257cwe-125
Published: Tue Jan 14 2025 (01/14/2025, 18:03:36 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Windows WLAN AutoConfig Service Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:08:15 UTC

Technical Analysis

CVE-2025-21257 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows WLAN AutoConfig Service on Windows 10 Version 1607 (build 10.0.14393.0). The vulnerability arises when the service improperly handles memory bounds during processing, allowing an attacker with local privileges to read memory outside the intended buffer boundaries. This can lead to the disclosure of sensitive information residing in adjacent memory areas. The flaw does not allow code execution, nor does it affect system integrity or availability, but it compromises confidentiality. Exploitation requires local access with at least limited privileges (AV:L/PR:L), and no user interaction is necessary (UI:N). The vulnerability has a CVSS 3.1 base score of 5.5, reflecting moderate risk primarily due to the requirement for local privileges and the limited scope of impact. As of the published date, no exploits have been observed in the wild, and no official patches have been released. The vulnerability is particularly relevant for environments where legacy Windows 10 1607 systems remain in use, especially in scenarios where local access controls may be weak or where sensitive WLAN configuration data is stored in memory. Organizations should monitor for updates from Microsoft and consider mitigating controls to prevent unauthorized local access.

Potential Impact

For European organizations, the primary impact of CVE-2025-21257 is the potential disclosure of sensitive WLAN configuration or related information stored in memory, which could aid attackers in further network reconnaissance or lateral movement. Although the vulnerability does not allow remote exploitation or system compromise directly, it poses a risk in environments where local access can be obtained, such as shared workstations, terminal servers, or through insider threats. Sectors with high security requirements like government, finance, healthcare, and critical infrastructure may be more affected due to the sensitivity of the information potentially exposed. The medium severity rating reflects that while the vulnerability is not immediately exploitable remotely, the confidentiality breach could facilitate more advanced attacks if combined with other vulnerabilities or social engineering. Legacy systems running Windows 10 Version 1607 are more vulnerable, and organizations that have not upgraded to newer Windows versions remain at risk. The lack of a patch increases the urgency for interim mitigations.

Mitigation Recommendations

1. Restrict local access to systems running Windows 10 Version 1607 by enforcing strict access controls and monitoring for unauthorized logins. 2. Implement endpoint detection and response (EDR) solutions to detect suspicious local activities that could indicate exploitation attempts. 3. Disable or limit the use of WLAN AutoConfig Service where feasible, especially on systems that do not require wireless connectivity. 4. Apply the principle of least privilege to user accounts to reduce the risk of local privilege exploitation. 5. Regularly audit and update system configurations to ensure legacy systems are identified and prioritized for upgrade. 6. Monitor Microsoft security advisories closely for the release of patches or workarounds addressing this vulnerability. 7. Educate IT staff and users about the risks of local access vulnerabilities and enforce physical security controls to prevent unauthorized device access. 8. Consider network segmentation to isolate legacy systems and limit the potential impact of information disclosure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.933Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4f9ed239a66badeae6

Added to database: 9/9/2025, 11:50:39 PM

Last enriched: 2/14/2026, 8:08:15 AM

Last updated: 3/26/2026, 8:57:13 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses