Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24069: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-24069cvecve-2025-24069cwe-125
Published: Tue Jun 10 2025 (06/10/2025, 17:02:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 20:58:30 UTC

Technical Analysis

CVE-2025-24069 is a medium severity vulnerability classified under CWE-125 (Out-of-bounds Read) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw exists in the Windows Storage Management Provider component, where improper bounds checking allows an authorized local attacker to read memory outside the intended buffer boundaries. This can lead to disclosure of sensitive information residing in adjacent memory areas. The vulnerability requires the attacker to have low-level privileges on the affected system but does not require user interaction, making exploitation feasible by any authorized local user or process. The CVSS v3.1 base score is 5.5, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No public exploits or widespread exploitation have been reported to date. The vulnerability was reserved in January 2025 and published in June 2025. No official patches have been linked yet, but mitigation would typically involve applying security updates from Microsoft or upgrading to a supported Windows version. The vulnerability primarily threatens confidentiality by exposing potentially sensitive data from memory, which could include credentials, cryptographic keys, or other private information. Since Windows 10 Version 1507 is an early release of Windows 10, many organizations have likely moved to newer versions, but legacy systems remain at risk. This vulnerability underscores the importance of maintaining up-to-date operating systems and restricting local access to trusted users only.

Potential Impact

The primary impact of CVE-2025-24069 is unauthorized disclosure of sensitive information due to out-of-bounds memory reads. This can compromise confidentiality by leaking data such as credentials, encryption keys, or other sensitive information stored in memory. Although the vulnerability does not affect system integrity or availability, the information disclosure could facilitate further attacks, including privilege escalation or lateral movement within a network. Organizations with legacy Windows 10 Version 1507 systems are at risk, especially if local user accounts are shared or if attackers gain low-level access through other means. The medium severity rating reflects that exploitation requires local access and privileges, limiting remote attack scenarios. However, in environments where insider threats or compromised local accounts exist, the risk is significant. The lack of known exploits reduces immediate threat but does not eliminate future exploitation potential. Overall, the vulnerability could undermine trust in affected systems and lead to data breaches if exploited.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1507 is outdated and no longer supported. 2. Apply any security updates released by Microsoft addressing this vulnerability once available. 3. Restrict local access to trusted users only, minimizing the number of accounts with local privileges on affected systems. 4. Implement strict access controls and monitoring on systems running legacy Windows versions to detect suspicious local activity. 5. Use endpoint protection solutions capable of detecting anomalous behavior indicative of exploitation attempts. 6. Employ application whitelisting and privilege management to limit the ability of low-privilege users to execute unauthorized code. 7. Conduct regular audits of legacy systems and plan for decommissioning or upgrading to reduce exposure to known vulnerabilities. 8. Educate IT staff and users about the risks of running unsupported operating system versions and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.734Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c39389ac7

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 2/21/2026, 8:58:30 PM

Last updated: 3/26/2026, 8:52:59 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses