Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24035: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-24035cvecve-2025-24035cwe-591
Published: Tue Mar 11 2025 (03/11/2025, 16:58:51 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:49:09 UTC

Technical Analysis

CVE-2025-24035 is a vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Remote Desktop Services (RDS) component. The root cause is the improper locking of memory used to store sensitive data, classified under CWE-591 (Sensitive Data Storage in Improperly Locked Memory). This weakness allows an unauthorized attacker to remotely execute arbitrary code over the network without requiring any authentication or user interaction. The vulnerability affects Windows 10 build 10.0.17763.0 and was published on March 11, 2025. The CVSS v3.1 base score is 8.1, indicating a high severity level, with vector metrics showing network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability arises because sensitive data in memory is not properly locked, which can lead to leakage or manipulation by attackers exploiting the RDS service. Although no known exploits have been reported in the wild yet, the potential for remote code execution without authentication makes this a critical risk for affected systems. The lack of patch links suggests that a fix may be pending or in progress, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-24035 is significant due to the widespread use of Windows 10 Version 1809 in enterprise environments, particularly in sectors relying on Remote Desktop Services for remote access and administration. Successful exploitation could lead to full system compromise, allowing attackers to steal sensitive data, disrupt services, or deploy ransomware and other malware. Confidentiality is severely impacted as sensitive data stored in memory can be exposed. Integrity and availability are also at risk due to the possibility of arbitrary code execution and system manipulation. Critical infrastructure, government agencies, financial institutions, and healthcare providers in Europe could face operational disruptions and data breaches. The high attack complexity somewhat reduces the likelihood of widespread exploitation but does not eliminate the threat, especially from skilled adversaries. The absence of known exploits in the wild provides a window for proactive defense, but the potential damage warrants urgent attention.

Mitigation Recommendations

1. Apply official Microsoft security patches immediately once available for Windows 10 Version 1809 to address the memory locking flaw in Remote Desktop Services. 2. Until patches are deployed, restrict Remote Desktop Services exposure by limiting RDP access to trusted networks only, using firewalls and network segmentation. 3. Implement VPNs or other secure remote access solutions to add authentication and encryption layers before accessing RDS. 4. Monitor network traffic for unusual RDP connection attempts and employ intrusion detection/prevention systems tuned for RDP anomalies. 5. Disable Remote Desktop Services on systems where it is not required to reduce the attack surface. 6. Enforce strict access controls and multi-factor authentication for remote access to critical systems. 7. Regularly audit and update endpoint security solutions to detect potential exploitation attempts. 8. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving RDS exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.730Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb2fc

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 12/17/2025, 11:49:09 PM

Last updated: 1/19/2026, 9:57:05 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats