Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21319: CWE-532: Insertion of Sensitive Information into Log File in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21319cvecve-2025-21319cwe-532
Published: Tue Jan 14 2025 (01/14/2025, 18:03:58 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Kernel Memory Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:21:04 UTC

Technical Analysis

CVE-2025-21319 is a vulnerability classified under CWE-532, which involves the insertion of sensitive information into log files, specifically within Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability arises from the Windows kernel inadvertently logging sensitive memory information, which could include kernel memory contents or other confidential data, into system log files accessible to users with local access. This leakage of sensitive information can facilitate further attacks by providing attackers with insights into the system's internal state or secrets such as cryptographic keys or credentials. The CVSS 3.1 base score is 5.5 (medium), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity or availability. No known exploits are reported in the wild, and no patches have been officially released at the time of publication. The vulnerability is particularly relevant for legacy systems still running the original Windows 10 release, which is out of mainstream support, increasing the risk of unpatched exposure. The insertion of sensitive kernel memory into logs can be exploited by malicious insiders or malware with local access to gather information that could be used for privilege escalation or lateral movement within a network.

Potential Impact

For European organizations, the primary impact of CVE-2025-21319 is the potential unauthorized disclosure of sensitive kernel memory information, which can compromise confidentiality. This leakage could enable attackers to gain insights into system internals, potentially facilitating privilege escalation or further exploitation. Organizations relying on legacy Windows 10 Version 1507 systems, especially in critical infrastructure sectors such as finance, healthcare, and government, may face increased risks if local access controls are weak. The vulnerability does not directly affect system integrity or availability, but the information disclosure could be a stepping stone for more severe attacks. Since the vulnerability requires local privileges, the risk is higher in environments where endpoint security is lax or where insider threats exist. The lack of an official patch increases exposure time, making timely mitigation critical. European entities with compliance requirements around data protection (e.g., GDPR) must consider the confidentiality impact seriously, as leakage of sensitive information could lead to regulatory penalties.

Mitigation Recommendations

1. Upgrade affected systems to a supported and patched version of Windows 10 or later, as Windows 10 Version 1507 is out of mainstream support and unlikely to receive official patches. 2. Restrict local access to systems running this legacy OS by enforcing strict access controls, including the use of least privilege principles and strong authentication mechanisms. 3. Monitor system logs for unusual access patterns or the presence of sensitive information in logs, employing log management and data loss prevention tools. 4. Implement endpoint detection and response (EDR) solutions to detect suspicious activities that may indicate attempts to exploit this vulnerability. 5. Harden systems by disabling unnecessary services and accounts to reduce the attack surface. 6. Educate users and administrators about the risks of running unsupported OS versions and the importance of timely patching and upgrades. 7. Where upgrading is not immediately feasible, consider isolating legacy systems within segmented network zones to limit potential lateral movement.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.955Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd529ed239a66badebc3

Added to database: 9/9/2025, 11:50:42 PM

Last enriched: 2/14/2026, 8:21:04 AM

Last updated: 3/25/2026, 2:34:02 PM

Views: 170

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses