Skip to main content

CVE-2025-24984: CWE-532: Insertion of Sensitive Information into Log File in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-24984cvecve-2025-24984cwe-532
Published: Tue Mar 11 2025 (03/11/2025, 16:59:18 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.

AI-Powered Analysis

AILast updated: 08/05/2025, 01:03:19 UTC

Technical Analysis

CVE-2025-24984 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) related to the insertion of sensitive information into log files within the NTFS file system. This vulnerability is categorized under CWE-532, which involves the inadvertent inclusion of sensitive data in log files. Specifically, the flaw allows sensitive information to be written to logs in a manner that could be accessed by an unauthorized attacker who has physical access to the affected system. The vulnerability does not require any user interaction or privileges to exploit, but it does require physical access to the device, as the attack vector is local and physical. The CVSS v3.1 base score is 4.6, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) highlights that the attack vector is physical, with low attack complexity, no privileges or user interaction required, and the impact is high on confidentiality but none on integrity or availability. The vulnerability could lead to unauthorized disclosure of sensitive information stored or processed on the system, potentially exposing credentials, cryptographic keys, or other confidential data logged by the system or applications. No known exploits are currently in the wild, and no patch links have been provided yet, indicating that mitigation may rely on configuration changes or physical security controls until an official fix is released.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to environments where Windows 10 Version 1809 systems are still in use, especially in sectors with high physical access risks such as manufacturing floors, public kiosks, or shared workstations. The confidentiality breach could lead to exposure of sensitive corporate data, intellectual property, or personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. Since the attack requires physical access, the threat is more pronounced in scenarios where devices are not adequately secured or monitored. The lack of impact on integrity and availability limits the scope to data confidentiality, but given the sensitivity of information potentially exposed, the risk remains significant. Organizations handling sensitive personal data, financial information, or critical infrastructure should be particularly vigilant. The medium severity rating suggests that while the vulnerability is not immediately critical, it should be addressed promptly to prevent exploitation, especially in environments with less stringent physical security controls.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first inventory and identify all systems running Windows 10 Version 1809. Until a patch is available, organizations should enforce strict physical security controls such as locked server rooms, restricted access to workstations, and surveillance in areas where vulnerable devices are located. Implementing full disk encryption (e.g., BitLocker) can help protect data at rest, including log files, from unauthorized physical access. Additionally, organizations should review logging configurations to minimize the inclusion of sensitive information in logs and ensure logs are stored securely with appropriate access controls. Regularly auditing log files for sensitive data and employing log management solutions that redact or encrypt sensitive entries can reduce exposure. Planning for an upgrade to a supported and patched Windows version is advisable since Windows 10 Version 1809 is an older release and may no longer receive security updates. Finally, educating staff about the risks of physical access and enforcing endpoint security policies will further reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.992Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb35f

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 8/5/2025, 1:03:19 AM

Last updated: 8/13/2025, 7:29:02 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats