Skip to main content

CVE-2025-21374: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-21374cvecve-2025-21374cwe-125
Published: Tue Jan 14 2025 (01/14/2025, 18:04:45 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows CSC Service Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 00:08:31 UTC

Technical Analysis

CVE-2025-21374 is a medium-severity vulnerability identified as an out-of-bounds read (CWE-125) in the Microsoft Windows 10 Version 1809 operating system, specifically affecting build 10.0.17763.0. The vulnerability resides within the Client-Side Caching (CSC) service, which is responsible for offline file synchronization and caching in Windows environments. An out-of-bounds read occurs when a program reads data past the boundary of allocated memory, potentially exposing sensitive information stored in adjacent memory locations. In this case, the flaw can lead to information disclosure, allowing an attacker with limited privileges (requires local access and low privileges) to read sensitive data from memory that should otherwise be inaccessible. The vulnerability does not require user interaction and does not impact system integrity or availability, but it does compromise confidentiality. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), privileges required low (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity or availability impact (I:N, A:N), and official remediation status (RL:O, RC:C). No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates once available. The vulnerability's exploitation requires local access, making remote exploitation unlikely without prior system compromise. However, in environments where multiple users share a system or where attackers have gained limited access, this vulnerability could be leveraged to extract sensitive information from memory, potentially aiding further attacks or data breaches.

Potential Impact

For European organizations, the primary impact of CVE-2025-21374 is the potential unauthorized disclosure of sensitive information on systems running Windows 10 Version 1809. Many enterprises, government agencies, and critical infrastructure operators in Europe still maintain legacy systems for compatibility or operational reasons, including this Windows version. The vulnerability could be exploited by malicious insiders or attackers who have gained limited local access, such as through compromised credentials or physical access, to extract confidential data. This could lead to leakage of intellectual property, personal data protected under GDPR, or security credentials, increasing the risk of subsequent attacks or regulatory penalties. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach alone can have significant reputational and compliance consequences. The lack of known exploits reduces immediate risk, but the absence of patches means organizations must remain vigilant. Additionally, environments with shared workstations or remote desktop services may face higher exposure. Given the medium severity and local access requirement, the threat is more pronounced in organizations with weaker endpoint security controls or where legacy Windows 10 1809 systems are still in active use.

Mitigation Recommendations

To mitigate CVE-2025-21374 effectively, European organizations should: 1) Prioritize upgrading or patching Windows 10 Version 1809 systems as soon as Microsoft releases an official fix. Until then, consider upgrading to a supported and more secure Windows version to eliminate exposure. 2) Restrict local access to affected systems by enforcing strict access controls, including limiting administrative and user privileges, and employing strong authentication mechanisms such as multi-factor authentication. 3) Implement endpoint detection and response (EDR) solutions to monitor for suspicious local activity that could indicate attempts to exploit memory vulnerabilities. 4) Harden physical security to prevent unauthorized physical access to devices running the vulnerable OS. 5) Conduct regular audits to identify and remediate legacy systems still running Windows 10 1809, replacing or isolating them where possible. 6) Educate users about the risks of local privilege escalation and information disclosure vulnerabilities, emphasizing the importance of reporting suspicious activity. 7) Employ memory protection technologies and ensure that security features like Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are enabled and properly configured to reduce exploitation likelihood. These targeted steps go beyond generic advice by focusing on access restriction, system upgrades, and monitoring tailored to the specific characteristics of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.362Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd539ed239a66badec44

Added to database: 9/9/2025, 11:50:43 PM

Last enriched: 9/10/2025, 12:08:31 AM

Last updated: 9/10/2025, 6:48:35 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats