Skip to main content

CVE-2025-24035: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-24035cvecve-2025-24035cwe-591
Published: Tue Mar 11 2025 (03/11/2025, 16:58:51 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 14:32:05 UTC

Technical Analysis

CVE-2025-24035 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically within the Windows Remote Desktop Services component. The vulnerability is classified under CWE-591, which pertains to sensitive data storage in improperly locked memory. This means that sensitive information handled by Remote Desktop Services is stored in memory regions that are not adequately protected or locked, potentially allowing unauthorized attackers to access or manipulate this data. Exploitation of this vulnerability could enable an attacker to execute arbitrary code remotely over the network without requiring any prior authentication or user interaction. The CVSS 3.1 base score of 8.1 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack vector is network-based (AV:N), but the attack complexity is high (AC:H), indicating that exploitation requires specific conditions or expertise. The vulnerability is publicly disclosed and assigned a CVE identifier, but as of the publication date, no known exploits are reported in the wild. The lack of available patches at the time of disclosure suggests that affected organizations must prioritize mitigation and monitoring strategies. The root cause lies in improper memory management within Remote Desktop Services, which is a widely used feature for remote administration and access in enterprise environments. Given the criticality and the potential for remote code execution, this vulnerability poses a significant risk to affected systems, especially those exposed to untrusted networks or the internet.

Potential Impact

For European organizations, the impact of CVE-2025-24035 can be substantial. Many enterprises, government agencies, and critical infrastructure operators rely on Windows 10 Version 1809 for legacy support or specific operational needs. Remote Desktop Services is commonly used for remote administration, teleworking, and third-party vendor access. Successful exploitation could lead to full system compromise, data breaches involving sensitive or personal data protected under GDPR, disruption of business operations, and potential lateral movement within corporate networks. The confidentiality, integrity, and availability of critical systems could be severely affected, leading to financial losses, reputational damage, and regulatory penalties. Organizations in sectors such as finance, healthcare, manufacturing, and public administration are particularly at risk due to their reliance on remote access and the sensitivity of their data. Moreover, the high attack impact combined with the network attack vector means that exposed Remote Desktop Services endpoints could be targeted by threat actors, including cybercriminal groups and nation-state actors, increasing the threat landscape for European entities.

Mitigation Recommendations

Given the absence of official patches at the time of disclosure, European organizations should implement immediate compensating controls to mitigate the risk. These include: 1) Restricting Remote Desktop Services access strictly to trusted internal networks or via secure VPN tunnels to prevent exposure to untrusted external networks. 2) Employing network-level authentication (NLA) and multi-factor authentication (MFA) for all remote access to reduce the risk of unauthorized exploitation. 3) Monitoring network traffic and system logs for unusual Remote Desktop connection attempts or anomalous behavior indicative of exploitation attempts. 4) Applying strict firewall rules to limit inbound RDP traffic to known IP addresses and disabling RDP on systems where it is not essential. 5) Considering upgrading affected systems to a newer, supported Windows version where this vulnerability is not present or has been patched. 6) Preparing for rapid deployment of official patches once released by Microsoft, including testing and validation in controlled environments. 7) Conducting user awareness training to recognize phishing or social engineering attempts that could facilitate exploitation. These targeted measures go beyond generic advice by focusing on access control, monitoring, and system hardening specific to Remote Desktop Services and Windows 10 Version 1809.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.730Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb2fc

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 2:32:05 PM

Last updated: 8/18/2025, 11:32:52 PM

Views: 40

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats