Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24055: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-24055cvecve-2025-24055cwe-125
Published: Tue Mar 11 2025 (03/11/2025, 16:59:10 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:52:13 UTC

Technical Analysis

CVE-2025-24055 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows USB Video Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an attacker with authorized access and physical proximity to the affected system to read memory outside the intended buffer boundaries. Such out-of-bounds reads can lead to disclosure of sensitive information residing in adjacent memory areas, potentially exposing confidential data. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and the attack vector is physical (AV:P), meaning the attacker must have physical access to the device, such as connecting a malicious USB device or manipulating existing USB video hardware. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). The CVSS v3.1 base score is 4.3, indicating medium severity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved in January 2025 and published in March 2025. Given the nature of the vulnerability, it primarily threatens environments where physical security is insufficient and legacy Windows 10 1809 systems remain in use, especially those utilizing USB video devices such as webcams or video capture hardware.

Potential Impact

For European organizations, the impact of CVE-2025-24055 is primarily the potential unauthorized disclosure of sensitive information due to out-of-bounds memory reads. This could include exposure of confidential data processed or stored in memory buffers related to USB video devices. The requirement for physical access limits the attacker's ability to exploit this vulnerability remotely, reducing the risk for organizations with strong physical security controls. However, sectors with high-value targets such as government, defense, finance, and critical infrastructure could face significant risks if attackers gain physical access to devices running Windows 10 Version 1809. Legacy systems that have not been updated or replaced remain vulnerable, potentially exposing sensitive operational or personal data. The lack of impact on integrity and availability means the vulnerability does not allow system compromise or denial of service but still poses a confidentiality risk. The absence of known exploits reduces immediate threat levels but does not eliminate future exploitation possibilities. Organizations relying on USB video devices in sensitive environments should consider this vulnerability seriously, especially where physical device access cannot be fully controlled.

Mitigation Recommendations

1. Upgrade or patch: Although no official patch is currently available, organizations should prioritize upgrading from Windows 10 Version 1809 to a supported and patched Windows version to eliminate this vulnerability. 2. Physical security: Strengthen physical access controls to prevent unauthorized individuals from connecting or manipulating USB devices on critical systems. 3. USB device control: Implement strict USB device management policies, including disabling unused USB ports, using endpoint security solutions to whitelist authorized USB devices, and monitoring USB device activity for anomalies. 4. Network segmentation: Isolate legacy systems with USB video devices in segmented network zones to limit exposure if physical access is compromised. 5. Incident response readiness: Prepare to detect and respond to suspicious activities involving USB devices, including memory forensics and monitoring for unusual data access patterns. 6. User awareness: Educate users and administrators about the risks of physical device tampering and encourage reporting of lost or suspicious hardware. 7. Inventory management: Maintain an accurate inventory of systems running Windows 10 Version 1809 and USB video hardware to identify and prioritize remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.733Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb31d

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 12/17/2025, 11:52:13 PM

Last updated: 1/7/2026, 4:23:50 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats