Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24984: CWE-532: Insertion of Sensitive Information into Log File in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-24984cvecve-2025-24984cwe-532
Published: Tue Mar 11 2025 (03/11/2025, 16:59:18 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:11:22 UTC

Technical Analysis

CVE-2025-24984 is a vulnerability identified in Microsoft Windows 10 Version 1809, specifically related to the NTFS file system's logging mechanism. The issue involves the insertion of sensitive information into log files, which are typically used for system auditing and recovery purposes. Due to improper handling, these logs may contain confidential data that should not be exposed. An attacker with physical access to the affected system can read these log files and extract sensitive information without requiring authentication or user interaction. The vulnerability is classified under CWE-532, which concerns the insertion of sensitive information into log files, potentially leading to information disclosure. The CVSS v3.1 score is 4.6 (medium severity), reflecting that the attack vector is physical (AV:P), with low complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may rely on system upgrades or configuration changes. This vulnerability is particularly relevant for environments where physical security is not guaranteed, and where sensitive data confidentiality is critical. Since Windows 10 Version 1809 is an older release, some organizations may still be using it due to legacy application compatibility or delayed upgrade cycles.

Potential Impact

The primary impact of CVE-2025-24984 is the unauthorized disclosure of sensitive information stored in NTFS log files on Windows 10 Version 1809 systems. For European organizations, this could lead to breaches of confidentiality, especially in sectors handling sensitive personal data (e.g., healthcare, finance, government). The requirement for physical access limits remote exploitation but raises concerns for environments with shared or poorly secured physical access, such as offices, data centers, or public-facing kiosks. Exposure of sensitive logs could facilitate further attacks or data leaks, potentially violating GDPR and other data protection regulations, resulting in legal and reputational damage. Organizations relying on legacy Windows 10 1809 systems in critical infrastructure or industrial control systems may face increased risk if physical security controls are insufficient. The lack of known exploits reduces immediate threat but does not eliminate risk, especially from insider threats or targeted physical attacks. Overall, the vulnerability could undermine trust in system integrity and data confidentiality within affected European entities.

Mitigation Recommendations

To mitigate CVE-2025-24984, European organizations should: 1) Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version where this vulnerability is resolved. 2) Implement strict physical security controls to prevent unauthorized access to devices, including secure facilities, locked server rooms, and endpoint protection measures. 3) Audit and monitor NTFS log files for sensitive information exposure and restrict access permissions to these logs to only trusted administrators. 4) Employ full disk encryption to protect data at rest, reducing the risk of data extraction from physical access. 5) Use endpoint detection and response (EDR) tools to detect unusual access patterns to log files. 6) Develop and enforce policies restricting the use of legacy operating systems in sensitive environments. 7) Educate staff about the risks of physical access attacks and enforce clean desk policies to minimize exposure. These steps go beyond generic advice by focusing on physical security, system upgrades, and log file management specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.992Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb35f

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 10/21/2025, 8:11:22 PM

Last updated: 11/27/2025, 5:05:03 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats