Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24061: CWE-693: Protection Mechanism Failure in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-24061cvecve-2025-24061cwe-693
Published: Tue Mar 11 2025 (03/11/2025, 16:59:12 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:56:35 UTC

Technical Analysis

CVE-2025-24061 is a vulnerability classified under CWE-693 (Protection Mechanism Failure) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the Mark of the Web (MOTW) feature, which is intended to mark files downloaded from the internet or untrusted sources to enforce security restrictions when these files are opened. The vulnerability allows a local attacker to bypass these protections, effectively circumventing the security boundary that MOTW enforces. This bypass can enable execution of malicious content or code that would otherwise be blocked or sandboxed, leading to potential unauthorized access or system compromise. The attack vector is local, requiring the attacker to have access to the victim machine and some user interaction, but no elevated privileges are necessary. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability (all rated high), with low attack complexity and no privileges required. Although no exploits are currently known in the wild, the vulnerability poses a significant risk, especially in environments where Windows 10 Version 1507 is still operational. The lack of available patches at the time of publication suggests that organizations must rely on mitigation strategies until official updates are released.

Potential Impact

For European organizations, this vulnerability presents a considerable risk, particularly in sectors where legacy Windows 10 Version 1507 systems remain in use, such as industrial control, healthcare, and government agencies with long upgrade cycles. Successful exploitation could lead to unauthorized code execution, data breaches, and disruption of critical services by compromising system confidentiality, integrity, and availability. The local attack vector means insider threats or attackers with physical or remote local access could leverage this flaw to escalate privileges or bypass security controls. This could facilitate lateral movement within networks and increase the attack surface for more severe intrusions. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge. Organizations relying on older Windows 10 versions without modern security features are particularly vulnerable, potentially impacting compliance with European data protection regulations if sensitive data is exposed.

Mitigation Recommendations

European organizations should prioritize upgrading from Windows 10 Version 1507 to a supported and patched Windows version to eliminate exposure to this vulnerability. Until patches are available, organizations should enforce strict access controls to limit local user access, implement application whitelisting to prevent execution of untrusted code, and enhance monitoring for suspicious local activities. User education to avoid interacting with untrusted files and disabling or restricting the use of MOTW where feasible can reduce risk. Network segmentation and the use of endpoint detection and response (EDR) tools can help detect and contain exploitation attempts. Regular audits of legacy systems and rapid decommissioning or isolation of unsupported Windows 10 versions will further mitigate exposure. Organizations should also stay alert for updates from Microsoft and apply security patches promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.733Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb330

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/14/2026, 8:56:35 AM

Last updated: 3/24/2026, 11:58:32 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses