Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21349: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21349cvecve-2025-21349cwe-287
Published: Tue Feb 11 2025 (02/11/2025, 17:58:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Remote Desktop Configuration Service Tampering Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:36:32 UTC

Technical Analysis

CVE-2025-21349 is a vulnerability classified under CWE-287 (Improper Authentication) affecting the Remote Desktop Configuration Service in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). This vulnerability arises from inadequate authentication controls that allow an unauthenticated remote attacker to tamper with Remote Desktop configuration settings. The attack vector is network-based (AV:N), but requires high attack complexity (AC:H) and user interaction (UI:R), with no privileges required (PR:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. Successful exploitation can lead to high confidentiality and integrity impacts (C:H/I:H), but no availability impact (A:N). The vulnerability was published on February 11, 2025, with no known exploits in the wild and no patches currently available. The affected product is an early Windows 10 release (Version 1507), which is largely out of mainstream support, but may still be present in legacy or isolated environments. The vulnerability could allow attackers to manipulate Remote Desktop settings, potentially enabling unauthorized remote access or denial of legitimate access through configuration changes. Given the lack of patches, mitigation relies on network-level controls and system hardening. The CVSS vector indicates that exploitation is not trivial, requiring user interaction and a complex attack, but the impact of a successful attack is significant, especially in environments relying heavily on Remote Desktop for remote management and access.

Potential Impact

The vulnerability poses a significant risk to organizations that continue to operate Windows 10 Version 1507 systems with Remote Desktop enabled. Successful exploitation can lead to unauthorized disclosure of sensitive information (confidentiality impact) and unauthorized modification of Remote Desktop configurations (integrity impact), potentially allowing attackers to gain persistent remote access or disrupt legitimate remote management. While availability is not directly impacted, the integrity compromise could indirectly affect system availability if attackers disable or misconfigure Remote Desktop services. Organizations with legacy systems in critical infrastructure sectors, such as government, finance, healthcare, and industrial control systems, are particularly vulnerable. The medium severity rating reflects the balance between the difficulty of exploitation and the potential damage. However, the lack of patches and the presence of Remote Desktop in many enterprise environments increase the risk profile. Attackers could leverage this vulnerability as a foothold for further lateral movement within networks, especially in environments where network segmentation and endpoint protections are weak. The requirement for user interaction and high attack complexity somewhat limits mass exploitation but targeted attacks remain a concern.

Mitigation Recommendations

1. Disable Remote Desktop services on Windows 10 Version 1507 systems if not strictly necessary to eliminate the attack surface. 2. Restrict network access to Remote Desktop ports (default TCP 3389) using firewalls and network segmentation, allowing only trusted IP addresses or VPN connections. 3. Implement strict monitoring and alerting for changes to Remote Desktop configuration settings, using security information and event management (SIEM) tools or endpoint detection and response (EDR) solutions. 4. Upgrade affected systems to a supported and patched version of Windows 10 or later to receive security updates and reduce exposure to legacy vulnerabilities. 5. Enforce multi-factor authentication (MFA) for Remote Desktop access where possible to add an additional layer of authentication beyond the vulnerable service. 6. Conduct regular vulnerability assessments and penetration tests focusing on Remote Desktop services to identify and remediate weaknesses. 7. Educate users about the risks of interacting with unsolicited prompts or links that could trigger exploitation attempts requiring user interaction. 8. Apply network intrusion detection/prevention systems (IDS/IPS) rules to detect anomalous Remote Desktop configuration tampering attempts. These measures collectively reduce the likelihood of successful exploitation and limit the potential impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.353Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f00058703ef3fc98014

Added to database: 12/17/2025, 10:30:24 PM

Last enriched: 2/26/2026, 11:36:32 PM

Last updated: 3/24/2026, 9:38:21 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses