Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21299: CWE-922: Insecure Storage of Sensitive Information in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21299cvecve-2025-21299cwe-922
Published: Tue Jan 14 2025 (01/14/2025, 18:03:51 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Kerberos Security Feature Bypass Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:16:39 UTC

Technical Analysis

CVE-2025-21299 is a vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw allows a local attacker with limited privileges to bypass Kerberos security features by exploiting how sensitive authentication information is stored insecurely on the system. Kerberos is a critical authentication protocol widely used in enterprise environments to securely authenticate users and services. This vulnerability enables attackers to access or manipulate Kerberos credentials or tokens, potentially leading to unauthorized access or privilege escalation within the affected system. The CVSS v3.1 score of 7.1 reflects a high severity due to the high impact on confidentiality and integrity, the requirement for only low complexity attack conditions, and the need for limited privileges but no user interaction. No public exploits are known at this time, but the vulnerability remains a significant risk for legacy systems that have not been updated. The lack of available patches or updates for this specific build increases the urgency for organizations to consider upgrading or applying mitigations. The vulnerability's exploitation could undermine the trust model of Kerberos authentication, leading to broader network security implications in enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2025-21299 is considerable, especially for those still operating legacy Windows 10 Version 1507 systems. Successful exploitation can lead to unauthorized access to sensitive authentication tokens, enabling attackers to impersonate users or escalate privileges. This compromises the confidentiality and integrity of authentication processes, potentially allowing lateral movement within corporate networks and access to critical systems. Sectors such as finance, government, healthcare, and critical infrastructure that rely heavily on Kerberos for secure authentication are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. The vulnerability could also complicate compliance with European data protection regulations like GDPR if sensitive data is exposed. Additionally, organizations with limited patch management capabilities or those using legacy systems due to operational constraints face increased exposure. The overall availability impact is low, but the breach of authentication integrity can have cascading effects on network security and data protection.

Mitigation Recommendations

To mitigate CVE-2025-21299, European organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched Windows version where this vulnerability is addressed. If upgrading is not immediately feasible, organizations should implement strict access controls to limit local user privileges and restrict physical and remote access to affected machines. Employing endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to Kerberos authentication can help detect exploitation attempts. Network segmentation can reduce the impact of potential lateral movement following exploitation. Organizations should also review and harden Kerberos configurations, including enforcing strong ticket lifetimes and renewal policies. Regular audits of local accounts and privilege assignments can minimize the attack surface. Finally, maintaining an up-to-date inventory of systems running legacy software and applying compensating controls such as application whitelisting and enhanced logging will improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.949Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb73

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 2/14/2026, 8:16:39 AM

Last updated: 3/28/2026, 9:16:44 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses