Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21292: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-21292cvecve-2025-21292cwe-94
Published: Tue Jan 14 2025 (01/14/2025, 18:04:33 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Search Service Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:15:08 UTC

Technical Analysis

CVE-2025-21292 is a vulnerability identified in the Windows Search Service component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is categorized under CWE-94, which involves improper control of code generation, commonly known as code injection. This vulnerability allows an attacker with limited privileges (low-level user privileges) to inject and execute arbitrary code within the context of the Windows Search Service, thereby elevating their privileges to SYSTEM level. The vulnerability does not require user interaction and has a low attack complexity, making exploitation feasible in environments where the attacker already has some access. The CVSS v3.1 base score is 8.8 (high), reflecting the critical impact on confidentiality, integrity, and availability, as the attacker can gain full control over the affected system. The vulnerability has a scope change (S:C), meaning the attack can affect resources beyond the initially compromised component. No public exploit code or known active exploitation has been reported yet, but the risk remains significant due to the nature of the vulnerability and the widespread use of Windows 10 1809 in enterprise environments. The lack of patch links suggests that a fix may be pending or that users should upgrade to a newer supported version of Windows. The Windows Search Service is a core component used for indexing and searching files, making it a high-value target for attackers aiming to gain persistent and elevated access.

Potential Impact

For European organizations, the impact of CVE-2025-21292 is substantial. Successful exploitation allows attackers to gain SYSTEM-level privileges from a low-privilege user context, enabling full control over affected machines. This can lead to unauthorized access to sensitive data, disruption of critical services, deployment of ransomware or other malware, and lateral movement within networks. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the high value of their data and services. The vulnerability's presence in Windows 10 Version 1809, which is still in use in some legacy systems across Europe, increases the risk of targeted attacks. Additionally, the lack of required user interaction and low complexity of exploitation make automated or wormable attacks plausible if exploit code emerges. This could result in widespread compromise and significant operational and reputational damage.

Mitigation Recommendations

1. Apply all available security updates from Microsoft immediately; if no patch is available for Windows 10 Version 1809, consider upgrading to a supported and patched Windows version. 2. Restrict access to the Windows Search Service by limiting permissions and network exposure, especially on systems that do not require search functionality. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block unauthorized code execution attempts. 4. Monitor logs and system behavior for unusual activity related to the Windows Search Service, such as unexpected process launches or privilege escalations. 5. Enforce the principle of least privilege to minimize the number of users with access to vulnerable systems. 6. Conduct network segmentation to contain potential breaches and prevent lateral movement. 7. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving privilege escalation via Windows services. 8. Regularly audit systems to identify those still running Windows 10 Version 1809 and prioritize their remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb57

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 2/14/2026, 8:15:08 AM

Last updated: 3/25/2026, 4:49:41 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses