Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21301: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21301cvecve-2025-21301cwe-284
Published: Tue Jan 14 2025 (01/14/2025, 18:03:52 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Geolocation Service Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:17:10 UTC

Technical Analysis

CVE-2025-21301 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0), specifically within the Windows Geolocation Service. The root cause is improper access control (CWE-284), which allows an attacker with low privileges (PR:L) to remotely access sensitive geolocation information without requiring user interaction (UI:N). The vulnerability does not affect system integrity or availability but has a high impact on confidentiality, as attackers can obtain location data that may reveal user or device whereabouts. The CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack can be performed remotely over the network with low complexity and no user interaction, but requires some level of privileges on the target system. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved in December 2024 and published in January 2025, suggesting it is a recent discovery. The affected Windows 10 version is an early release (1507), which is largely out of mainstream support, but may still be in use in legacy or specialized environments. The exposure of geolocation data could lead to privacy violations, targeted surveillance, or reconnaissance for further attacks. Given the nature of the vulnerability, attackers could leverage it to track devices or users without consent, posing risks especially in sensitive or regulated environments.

Potential Impact

For European organizations, the primary impact of CVE-2025-21301 is the unauthorized disclosure of sensitive geolocation data, which can compromise user privacy and organizational confidentiality. This is particularly critical for sectors handling sensitive personal data, such as healthcare, finance, and government agencies, where location information could be used for targeted attacks or espionage. The vulnerability does not allow system compromise or denial of service but can facilitate further attacks by revealing device locations. Organizations relying on legacy Windows 10 Version 1507 systems are at higher risk, especially if these systems are connected to networks accessible by potential attackers. The breach of location data could also conflict with European data protection regulations like GDPR, leading to legal and reputational consequences. Additionally, the lack of patches means organizations must rely on alternative mitigations until updates are available. The medium severity rating reflects a moderate but tangible risk that should not be ignored, especially in high-security environments.

Mitigation Recommendations

1. Upgrade all affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version to eliminate the vulnerability. 2. Restrict access to the Windows Geolocation Service via Group Policy or local security settings, limiting which users or processes can query location data. 3. Implement network segmentation and firewall rules to reduce exposure of legacy systems to untrusted networks. 4. Monitor logs and network traffic for unusual or unauthorized access attempts to geolocation services. 5. Educate users and administrators about the risks of running outdated operating systems and the importance of timely updates. 6. If upgrading is not immediately feasible, consider disabling the Geolocation Service temporarily to prevent data leakage, understanding this may impact functionality. 7. Maintain an inventory of systems running legacy Windows versions to prioritize remediation efforts. 8. Stay alert for official patches or security advisories from Microsoft and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.950Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb79

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 2/14/2026, 8:17:10 AM

Last updated: 3/25/2026, 3:03:29 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses