Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21288: CWE-908: Use of Uninitialized Resource in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-21288cvecve-2025-21288cwe-908
Published: Tue Jan 14 2025 (01/14/2025, 18:03:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows COM Server Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:07:25 UTC

Technical Analysis

CVE-2025-21288 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) involving the Windows Component Object Model (COM) server. The vulnerability is classified under CWE-908, which pertains to the use of uninitialized resources. Specifically, this flaw allows for information disclosure due to improper initialization of resources within the COM server component. An attacker with low privileges (local access) can exploit this vulnerability without requiring user interaction. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to gain unauthorized access to sensitive information residing in memory or other resources managed by the COM server, potentially leading to data leakage or further privilege escalation attempts if combined with other vulnerabilities.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems still running Windows 10 Version 1809, which is an older release. Organizations in sectors with legacy infrastructure or slower update cycles—such as government agencies, critical infrastructure, and certain industrial environments—may be more exposed. The information disclosure could lead to leakage of sensitive data, including credentials or configuration details, which could be leveraged for further attacks. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach could undermine trust, compliance with data protection regulations such as GDPR, and potentially expose organizations to targeted attacks. The requirement for local access and privileges limits remote exploitation but insider threats or compromised user accounts could still exploit this vulnerability. The lack of user interaction requirement increases the risk in automated or unattended environments.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should prioritize the following mitigations: 1) Identify and inventory all systems running Windows 10 Version 1809 and assess their criticality. 2) Apply any available security updates or workarounds from Microsoft as soon as they are released. 3) Restrict local access to sensitive systems by enforcing strict access control policies and monitoring for unauthorized privilege escalations. 4) Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 5) Harden COM server configurations where possible, including disabling unnecessary COM components or services. 6) Educate users and administrators about the risks of privilege misuse and insider threats. 7) Plan and execute upgrades to newer, supported Windows versions to reduce exposure to legacy vulnerabilities. 8) Implement strict network segmentation to limit lateral movement from compromised accounts or systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.945Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb4b

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 9/10/2025, 1:07:25 AM

Last updated: 10/29/2025, 9:54:05 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats