Skip to main content

CVE-2025-21382: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21382cvecve-2025-21382cwe-190cwe-122
Published: Tue Jan 14 2025 (01/14/2025, 18:04:10 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Graphics Component Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 00:07:55 UTC

Technical Analysis

CVE-2025-21382 is a high-severity elevation of privilege vulnerability affecting the Windows Graphics Component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The root cause is an integer overflow or wraparound condition (CWE-190) within the graphics subsystem. This type of vulnerability occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around to an unexpected value. In this case, the overflow likely leads to improper memory handling or buffer size miscalculations, which attackers can exploit to escalate privileges on the affected system. The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C reveals that the attack requires local access (AV:L) with low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The exploitability is currently unknown (E:U), and the remediation level is official fix available (RL:O) with confirmed report confidence (RC:C). No known exploits are reported in the wild yet. The vulnerability allows an attacker with limited local privileges to leverage the integer overflow in the graphics component to gain elevated privileges, potentially full system control. This could enable unauthorized access to sensitive data, system modification, or denial of service. The lack of user interaction requirement and low complexity make it a significant risk for systems still running this older Windows 10 version without patches. Given that Windows 10 Version 1809 is an older release, many organizations may have migrated to newer versions, but legacy systems remain vulnerable if unpatched.

Potential Impact

For European organizations, this vulnerability poses a serious risk especially to those maintaining legacy Windows 10 Version 1809 environments, such as industrial control systems, government agencies, or enterprises with long upgrade cycles. Successful exploitation could lead to privilege escalation, allowing attackers to bypass security controls, access confidential information, disrupt business operations, or deploy ransomware. The high impact on confidentiality, integrity, and availability means critical data and services could be compromised. Since the attack requires local access but no user interaction, insider threats or attackers who gain initial foothold through other means (e.g., phishing, physical access) could leverage this vulnerability to deepen their control. This is particularly concerning for sectors with sensitive data like finance, healthcare, and public administration across Europe. Additionally, organizations bound by GDPR must consider the regulatory implications of breaches resulting from exploitation of this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-21382, European organizations should prioritize patching affected Windows 10 Version 1809 systems as soon as official updates become available, given the official remediation level is 'O' (official fix). Where patching is not immediately feasible, organizations should implement strict access controls to limit local user privileges and restrict physical and remote access to vulnerable systems. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious activity related to privilege escalation attempts. Network segmentation can reduce the risk of lateral movement if an attacker exploits this vulnerability. Regularly audit and inventory systems to identify any running the affected Windows version and plan for upgrades to supported Windows releases. Additionally, enforce the principle of least privilege for all users and services to minimize the impact of potential exploitation. Since no user interaction is required, user training alone is insufficient; technical controls are critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd539ed239a66badec4d

Added to database: 9/9/2025, 11:50:43 PM

Last enriched: 9/10/2025, 12:07:55 AM

Last updated: 9/10/2025, 4:19:04 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats