Skip to main content

CVE-2025-24985: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-24985cvecve-2025-24985cwe-190cwe-122
Published: Tue Mar 11 2025 (03/11/2025, 16:59:18 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 08/05/2025, 01:03:31 UTC

Technical Analysis

CVE-2025-24985 is a high-severity integer overflow vulnerability identified in the Windows Fast FAT Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises due to improper handling of integer values within the FAT file system driver, leading to an integer overflow or wraparound condition. This flaw can be exploited by an unauthorized local attacker to execute arbitrary code with elevated privileges. The attack vector requires local access (AV:L) but does not require privileges (PR:N), though it does require user interaction (UI:R). The vulnerability impacts confidentiality, integrity, and availability (all rated high), indicating that successful exploitation could lead to full system compromise. The exploitability is considered functional (E:F), and the vulnerability is currently published but has no known exploits in the wild. The vulnerability is related to CWE-190 (Integer Overflow or Wraparound) and potentially CWE-122 (Heap-based Buffer Overflow), suggesting that the overflow could lead to memory corruption and arbitrary code execution. Given that the affected component is a core file system driver, exploitation could allow attackers to bypass security controls and gain kernel-level code execution, posing a significant risk to affected systems. The lack of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those still operating legacy systems running Windows 10 Version 1809. Successful exploitation could lead to local privilege escalation, allowing attackers to execute arbitrary code with system-level privileges, potentially leading to data breaches, ransomware deployment, or disruption of critical services. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to their reliance on Windows-based systems and the sensitivity of their data. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where insider threats or social engineering attacks are plausible. Additionally, the vulnerability could be leveraged as part of multi-stage attacks to establish persistence or move laterally within networks. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation, making proactive mitigation essential.

Mitigation Recommendations

European organizations should prioritize the following mitigation strategies: 1) Identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) to assess exposure. 2) Apply any available security updates or patches from Microsoft as soon as they are released; monitor official Microsoft security advisories closely. 3) Implement strict local access controls and limit user permissions to reduce the risk of unauthorized local code execution. 4) Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior indicative of exploitation attempts targeting the FAT driver. 5) Educate users on the risks of social engineering and the importance of cautious interaction with untrusted content to mitigate the user interaction requirement. 6) Consider upgrading affected systems to a more recent, supported Windows version where this vulnerability is not present. 7) Monitor system and security logs for unusual activity related to file system operations that could indicate exploitation attempts. 8) Use network segmentation to limit the spread of potential compromises originating from exploited local machines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.992Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb361

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 8/5/2025, 1:03:31 AM

Last updated: 8/18/2025, 1:22:22 AM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats