CVE-2025-24065: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-24065 is an out-of-bounds read vulnerability classified under CWE-125, affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists in the Windows Storage Management Provider component, which handles storage-related operations within the operating system. An out-of-bounds read occurs when a program reads data past the boundary of allocated memory, potentially exposing sensitive information. In this case, an authorized attacker with local access and low privileges (PR:L) can exploit this vulnerability to disclose information from memory that should not be accessible. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), meaning exploitation is straightforward once local access is obtained. The scope of the vulnerability is unchanged (S:U), indicating the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level primarily due to the high confidentiality impact (C:H) but no impact on integrity or availability (I:N/A:N). No known exploits are reported in the wild, and no patches have been linked yet, suggesting that mitigation may currently rely on workarounds or access control measures. Since the vulnerability requires local privileges, it cannot be exploited remotely, limiting the attack surface to insiders or users with some level of system access. However, the information disclosure could aid attackers in further attacks or privilege escalation by revealing sensitive system or application data.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially in environments where Windows 10 Version 1809 is still in use. Information disclosure vulnerabilities can lead to leakage of sensitive data such as credentials, cryptographic keys, or system configuration details, which can be leveraged for lateral movement or privilege escalation within corporate networks. Organizations with strict data protection regulations, such as GDPR, must consider the potential compliance implications if sensitive personal or corporate data is exposed. The requirement for local access reduces the risk from external attackers but increases concern for insider threats or compromised user accounts. Industrial, governmental, and financial sectors in Europe, which often maintain legacy systems for compatibility reasons, may be particularly vulnerable. Additionally, organizations with shared or multi-user environments (e.g., terminal servers, virtual desktop infrastructures) could see increased risk due to multiple users having local access. The lack of a patch at the time of reporting means organizations must rely on compensating controls to mitigate risk until an official fix is available.
Mitigation Recommendations
1. Upgrade and Patch: Organizations should prioritize upgrading affected systems to a supported and patched Windows version beyond 1809, as Microsoft typically addresses such vulnerabilities in cumulative updates. 2. Access Control: Restrict local access to systems running Windows 10 Version 1809 to trusted users only. Implement strict user account management and monitor for unauthorized access attempts. 3. Least Privilege: Enforce the principle of least privilege to minimize the number of users with local access rights that could exploit this vulnerability. 4. Network Segmentation: Segment critical systems to limit lateral movement opportunities if an attacker gains local access. 5. Monitoring and Logging: Enable detailed logging and monitor for unusual local activity that could indicate exploitation attempts. 6. Disable Unnecessary Services: If feasible, disable or restrict the Windows Storage Management Provider or related services to reduce the attack surface. 7. Incident Response Preparedness: Prepare for potential exploitation by having incident response plans that include detection and containment of information disclosure incidents. 8. Vendor Communication: Stay updated with Microsoft advisories for patches or workarounds and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-24065: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-24065 is an out-of-bounds read vulnerability classified under CWE-125, affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists in the Windows Storage Management Provider component, which handles storage-related operations within the operating system. An out-of-bounds read occurs when a program reads data past the boundary of allocated memory, potentially exposing sensitive information. In this case, an authorized attacker with local access and low privileges (PR:L) can exploit this vulnerability to disclose information from memory that should not be accessible. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), meaning exploitation is straightforward once local access is obtained. The scope of the vulnerability is unchanged (S:U), indicating the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level primarily due to the high confidentiality impact (C:H) but no impact on integrity or availability (I:N/A:N). No known exploits are reported in the wild, and no patches have been linked yet, suggesting that mitigation may currently rely on workarounds or access control measures. Since the vulnerability requires local privileges, it cannot be exploited remotely, limiting the attack surface to insiders or users with some level of system access. However, the information disclosure could aid attackers in further attacks or privilege escalation by revealing sensitive system or application data.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially in environments where Windows 10 Version 1809 is still in use. Information disclosure vulnerabilities can lead to leakage of sensitive data such as credentials, cryptographic keys, or system configuration details, which can be leveraged for lateral movement or privilege escalation within corporate networks. Organizations with strict data protection regulations, such as GDPR, must consider the potential compliance implications if sensitive personal or corporate data is exposed. The requirement for local access reduces the risk from external attackers but increases concern for insider threats or compromised user accounts. Industrial, governmental, and financial sectors in Europe, which often maintain legacy systems for compatibility reasons, may be particularly vulnerable. Additionally, organizations with shared or multi-user environments (e.g., terminal servers, virtual desktop infrastructures) could see increased risk due to multiple users having local access. The lack of a patch at the time of reporting means organizations must rely on compensating controls to mitigate risk until an official fix is available.
Mitigation Recommendations
1. Upgrade and Patch: Organizations should prioritize upgrading affected systems to a supported and patched Windows version beyond 1809, as Microsoft typically addresses such vulnerabilities in cumulative updates. 2. Access Control: Restrict local access to systems running Windows 10 Version 1809 to trusted users only. Implement strict user account management and monitor for unauthorized access attempts. 3. Least Privilege: Enforce the principle of least privilege to minimize the number of users with local access rights that could exploit this vulnerability. 4. Network Segmentation: Segment critical systems to limit lateral movement opportunities if an attacker gains local access. 5. Monitoring and Logging: Enable detailed logging and monitor for unusual local activity that could indicate exploitation attempts. 6. Disable Unnecessary Services: If feasible, disable or restrict the Windows Storage Management Provider or related services to reduce the attack surface. 7. Incident Response Preparedness: Prepare for potential exploitation by having incident response plans that include detection and containment of information disclosure incidents. 8. Vendor Communication: Stay updated with Microsoft advisories for patches or workarounds and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-16T23:11:19.734Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f501b0bd07c39389a89
Added to database: 6/10/2025, 6:54:08 PM
Last enriched: 7/17/2025, 9:02:05 PM
Last updated: 11/19/2025, 9:36:16 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11884: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ uCMDB
LowCVE-2025-63719: n/a
HighCVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store
MediumCVE-2025-13147: CWE-918 Server-Side Request Forgery (SSRF) in Progress MOVEit Transfer
MediumCVE-2025-63371: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.