Skip to main content

CVE-2025-24065: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-24065cvecve-2025-24065cwe-125
Published: Tue Jun 10 2025 (06/10/2025, 17:02:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 07/17/2025, 21:02:05 UTC

Technical Analysis

CVE-2025-24065 is an out-of-bounds read vulnerability classified under CWE-125, affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists in the Windows Storage Management Provider component, which handles storage-related operations within the operating system. An out-of-bounds read occurs when a program reads data past the boundary of allocated memory, potentially exposing sensitive information. In this case, an authorized attacker with local access and low privileges (PR:L) can exploit this vulnerability to disclose information from memory that should not be accessible. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), meaning exploitation is straightforward once local access is obtained. The scope of the vulnerability is unchanged (S:U), indicating the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level primarily due to the high confidentiality impact (C:H) but no impact on integrity or availability (I:N/A:N). No known exploits are reported in the wild, and no patches have been linked yet, suggesting that mitigation may currently rely on workarounds or access control measures. Since the vulnerability requires local privileges, it cannot be exploited remotely, limiting the attack surface to insiders or users with some level of system access. However, the information disclosure could aid attackers in further attacks or privilege escalation by revealing sensitive system or application data.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially in environments where Windows 10 Version 1809 is still in use. Information disclosure vulnerabilities can lead to leakage of sensitive data such as credentials, cryptographic keys, or system configuration details, which can be leveraged for lateral movement or privilege escalation within corporate networks. Organizations with strict data protection regulations, such as GDPR, must consider the potential compliance implications if sensitive personal or corporate data is exposed. The requirement for local access reduces the risk from external attackers but increases concern for insider threats or compromised user accounts. Industrial, governmental, and financial sectors in Europe, which often maintain legacy systems for compatibility reasons, may be particularly vulnerable. Additionally, organizations with shared or multi-user environments (e.g., terminal servers, virtual desktop infrastructures) could see increased risk due to multiple users having local access. The lack of a patch at the time of reporting means organizations must rely on compensating controls to mitigate risk until an official fix is available.

Mitigation Recommendations

1. Upgrade and Patch: Organizations should prioritize upgrading affected systems to a supported and patched Windows version beyond 1809, as Microsoft typically addresses such vulnerabilities in cumulative updates. 2. Access Control: Restrict local access to systems running Windows 10 Version 1809 to trusted users only. Implement strict user account management and monitor for unauthorized access attempts. 3. Least Privilege: Enforce the principle of least privilege to minimize the number of users with local access rights that could exploit this vulnerability. 4. Network Segmentation: Segment critical systems to limit lateral movement opportunities if an attacker gains local access. 5. Monitoring and Logging: Enable detailed logging and monitor for unusual local activity that could indicate exploitation attempts. 6. Disable Unnecessary Services: If feasible, disable or restrict the Windows Storage Management Provider or related services to reduce the attack surface. 7. Incident Response Preparedness: Prepare for potential exploitation by having incident response plans that include detection and containment of information disclosure incidents. 8. Vendor Communication: Stay updated with Microsoft advisories for patches or workarounds and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.734Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c39389a89

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 7/17/2025, 9:02:05 PM

Last updated: 8/3/2025, 12:37:27 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats