Skip to main content

CVE-2025-21292: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21292cvecve-2025-21292cwe-94
Published: Tue Jan 14 2025 (01/14/2025, 18:04:33 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Search Service Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:06:01 UTC

Technical Analysis

CVE-2025-21292 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from improper control of code generation, classified under CWE-94 (Improper Control of Generation of Code, commonly known as code injection). Specifically, it impacts the Windows Search Service, a core component responsible for indexing and searching files on the system. An attacker with limited privileges (low-level privileges) can exploit this flaw to execute arbitrary code within the context of the Windows Search Service, thereby escalating their privileges to SYSTEM level. The CVSS 3.1 base score is 8.8, indicating a high severity, with the vector string AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C. This means the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet, indicating the vulnerability is newly disclosed. The vulnerability allows an attacker to inject and execute arbitrary code, potentially leading to full system compromise, data theft, or disruption of services.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities still running Windows 10 Version 1809, which is an older but still in-use OS version in some environments. Successful exploitation could allow attackers to gain SYSTEM-level privileges, bypassing security controls and potentially moving laterally within networks. This could lead to unauthorized access to sensitive data, disruption of critical services, and deployment of ransomware or other malware. Given the high impact on confidentiality, integrity, and availability, organizations handling sensitive personal data (e.g., GDPR-regulated data), critical infrastructure, or intellectual property are particularly at risk. The lack of required user interaction and low complexity of exploitation increase the likelihood of internal threat actors or malware leveraging this vulnerability. Additionally, the changed scope means that the compromise could affect multiple system components, amplifying the damage.

Mitigation Recommendations

Organizations should prioritize identifying and inventorying systems running Windows 10 Version 1809. Since no official patches are currently linked, immediate mitigation should include applying any available workarounds or temporary mitigations recommended by Microsoft, such as disabling or restricting the Windows Search Service where feasible, especially on high-risk or critical systems. Employing application whitelisting and restricting code execution paths can reduce the risk of arbitrary code execution. Enhancing endpoint detection and response (EDR) capabilities to monitor for suspicious activity related to the Windows Search Service is advisable. Network segmentation and least privilege principles should be enforced to limit the impact of a potential compromise. Organizations should also plan for rapid deployment of patches once Microsoft releases them and conduct thorough post-patch testing. Regularly updating and enforcing strong local account policies and monitoring for privilege escalation attempts will further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb57

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 9/10/2025, 1:06:01 AM

Last updated: 9/10/2025, 3:10:20 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats