Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21293: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21293cvecve-2025-21293cwe-284
Published: Tue Jan 14 2025 (01/14/2025, 18:03:48 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Active Directory Domain Services Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:33:29 UTC

Technical Analysis

CVE-2025-21293 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) affecting Active Directory Domain Services (AD DS). The root cause is improper access control (CWE-284), which allows an attacker with low-level privileges (PR:L) to elevate their privileges to higher levels without requiring user interaction (UI:N). The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L), meaning an attacker can leverage this flaw without sophisticated conditions or prerequisites. The scope of the vulnerability is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation could lead to full compromise of the domain controller and potentially the entire Active Directory environment. The CVSS vector also indicates that the exploit code maturity is unofficial (E:U), and remediation level is official (RL:O) with confirmed reports (RC:C), but no patch links are currently available. This vulnerability is critical because Active Directory is a cornerstone of enterprise identity and access management, and privilege escalation here can lead to widespread domain compromise. Although no known exploits are currently in the wild, the ease of exploitation and the critical nature of the affected component make this a significant threat to organizations still running this legacy Windows 10 version.

Potential Impact

The potential impact of CVE-2025-21293 is severe for organizations worldwide, especially those relying on Windows 10 Version 1507 in enterprise environments. Successful exploitation allows attackers to elevate privileges within Active Directory Domain Services, potentially gaining domain administrator rights. This can lead to unauthorized access to sensitive data, disruption of authentication services, and the ability to deploy further malware or ransomware across the network. The compromise of Active Directory can undermine the entire security posture of an organization, enabling lateral movement, data exfiltration, and persistent control over IT infrastructure. Given the high CVSS score and the critical role of AD DS, organizations face risks including operational downtime, regulatory non-compliance, reputational damage, and financial losses. The lack of available patches increases the urgency for mitigation and risk management.

Mitigation Recommendations

1. Upgrade affected systems: The most effective mitigation is to upgrade from Windows 10 Version 1507 to a supported and patched Windows version, as this legacy build is no longer supported and lacks security updates. 2. Network segmentation: Isolate domain controllers and critical AD infrastructure from untrusted networks to reduce exposure to remote attacks. 3. Least privilege enforcement: Review and tighten user privileges to minimize the number of accounts with elevated rights that could be leveraged in an attack. 4. Monitor and alert: Implement advanced monitoring for unusual privilege escalation attempts and anomalous activities within Active Directory using Security Information and Event Management (SIEM) tools. 5. Apply compensating controls: Use multi-factor authentication (MFA) for administrative accounts and enforce strong access controls on AD management interfaces. 6. Incident response readiness: Prepare and test incident response plans specifically for AD compromise scenarios. 7. Stay informed: Monitor Microsoft advisories for patches or workarounds related to this vulnerability and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0c0d09ed239a66badfd01

Added to database: 9/10/2025, 12:05:36 AM

Last enriched: 2/26/2026, 11:33:29 PM

Last updated: 3/26/2026, 9:19:54 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses