Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21368: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-21368cvecve-2025-21368cwe-122
Published: Tue Feb 11 2025 (02/11/2025, 17:58:10 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft Digest Authentication Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:01:10 UTC

Technical Analysis

CVE-2025-21368 is a heap-based buffer overflow vulnerability identified in the Digest Authentication mechanism of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises from improper handling of input data during the authentication process, leading to memory corruption on the heap. An attacker with low privileges can exploit this remotely over the network without requiring user interaction, by sending specially crafted authentication requests. Successful exploitation allows remote code execution with the privileges of the targeted service, potentially enabling full system compromise. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), indicating that the flaw is due to unsafe memory operations on dynamically allocated buffers. The CVSS v3.1 score of 8.8 reflects a high severity, with attack vector being network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's characteristics make it a critical risk for affected systems. The lack of available patches at the time of reporting necessitates immediate risk mitigation through network controls and monitoring until updates are released by Microsoft.

Potential Impact

For European organizations, this vulnerability poses a significant threat due to the widespread use of Windows 10 Version 1809 in enterprise environments, including government, healthcare, finance, and critical infrastructure sectors. Exploitation can lead to unauthorized remote code execution, enabling attackers to gain control over affected systems, steal sensitive data, disrupt services, or deploy ransomware. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and reputational damage. Organizations with externally facing services or those using Digest Authentication in internal networks are particularly vulnerable. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility heighten the urgency. European data protection regulations such as GDPR increase the consequences of breaches stemming from this vulnerability, potentially leading to legal and financial penalties.

Mitigation Recommendations

1. Apply official Microsoft security patches immediately once they become available for Windows 10 Version 1809. 2. Until patches are released, restrict network exposure of systems running the affected version, especially blocking inbound traffic to services using Digest Authentication. 3. Implement network segmentation to isolate vulnerable systems from critical assets and limit lateral movement. 4. Monitor network traffic for unusual or malformed authentication requests indicative of exploitation attempts. 5. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect potential exploit patterns. 6. Review and harden authentication configurations to minimize reliance on Digest Authentication where possible, considering alternative secure methods such as Kerberos or certificate-based authentication. 7. Conduct thorough asset inventories to identify all systems running Windows 10 Version 1809 and prioritize remediation efforts. 8. Educate IT and security teams about the vulnerability specifics to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.360Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f00058703ef3fc9802c

Added to database: 12/17/2025, 10:30:24 PM

Last enriched: 12/17/2025, 11:01:10 PM

Last updated: 2/7/2026, 9:13:16 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats