CVE-2025-24988: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.
AI Analysis
Technical Summary
CVE-2025-24988 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows USB Video Driver. The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when the software reads data outside the boundaries of allocated memory. This flaw can be exploited by an authorized attacker with physical access to the affected system to elevate their privileges. The attack vector requires physical access (AV:P), but the attack complexity is low (AC:L), and the attacker must have low-level privileges (PR:L) on the system. No user interaction is required (UI:N) for exploitation. The vulnerability impacts confidentiality, integrity, and availability, all rated as high (C:H/I:H/A:H) in the CVSS vector. The scope remains unchanged (S:U), meaning the vulnerability affects resources managed by the same security authority. The vulnerability has been assigned a CVSS v3.1 base score of 6.6, indicating a medium severity level. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the potential for privilege escalation through physical access, which could allow an attacker to gain higher system privileges and potentially compromise the system further. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability is particularly relevant for environments where Windows 10 Version 1809 is still in use and where physical security may be less stringent, such as shared or public workstations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in scenarios where physical access to devices running Windows 10 Version 1809 is possible. Organizations with legacy systems or those that have not upgraded beyond this Windows version are at risk. Successful exploitation could lead to privilege escalation, enabling attackers to bypass security controls, access sensitive data, or disrupt system operations. This could impact confidentiality, integrity, and availability of critical information systems. Sectors such as government, finance, healthcare, and critical infrastructure, which often handle sensitive data and may have legacy systems, could face increased risk. Additionally, organizations with shared work environments or public access terminals are vulnerable to physical attacks exploiting this flaw. The medium severity rating suggests that while the vulnerability is serious, it requires specific conditions (physical access and existing low-level privileges) to be exploited, somewhat limiting its widespread impact. However, the potential for high-impact consequences necessitates proactive measures to mitigate risk.
Mitigation Recommendations
European organizations should prioritize upgrading systems from Windows 10 Version 1809 to a more recent, supported Windows version where this vulnerability is addressed. Until upgrades are feasible, strict physical security controls must be enforced to prevent unauthorized physical access to devices, including secure storage, access logging, and surveillance. Implementing endpoint security solutions that monitor for unusual privilege escalation attempts can help detect exploitation attempts. Organizations should also review and tighten user privilege assignments to minimize the number of users with low-level privileges that could be leveraged for exploitation. Regular audits of device inventory to identify systems running the affected version are critical. Since no patches are currently available, organizations should monitor Microsoft security advisories for updates and apply patches promptly once released. Additionally, disabling or restricting use of USB video devices where not necessary can reduce the attack surface. Employing full disk encryption can mitigate data confidentiality risks in case of physical device compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-24988: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.
AI-Powered Analysis
Technical Analysis
CVE-2025-24988 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows USB Video Driver. The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when the software reads data outside the boundaries of allocated memory. This flaw can be exploited by an authorized attacker with physical access to the affected system to elevate their privileges. The attack vector requires physical access (AV:P), but the attack complexity is low (AC:L), and the attacker must have low-level privileges (PR:L) on the system. No user interaction is required (UI:N) for exploitation. The vulnerability impacts confidentiality, integrity, and availability, all rated as high (C:H/I:H/A:H) in the CVSS vector. The scope remains unchanged (S:U), meaning the vulnerability affects resources managed by the same security authority. The vulnerability has been assigned a CVSS v3.1 base score of 6.6, indicating a medium severity level. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the potential for privilege escalation through physical access, which could allow an attacker to gain higher system privileges and potentially compromise the system further. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability is particularly relevant for environments where Windows 10 Version 1809 is still in use and where physical security may be less stringent, such as shared or public workstations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in scenarios where physical access to devices running Windows 10 Version 1809 is possible. Organizations with legacy systems or those that have not upgraded beyond this Windows version are at risk. Successful exploitation could lead to privilege escalation, enabling attackers to bypass security controls, access sensitive data, or disrupt system operations. This could impact confidentiality, integrity, and availability of critical information systems. Sectors such as government, finance, healthcare, and critical infrastructure, which often handle sensitive data and may have legacy systems, could face increased risk. Additionally, organizations with shared work environments or public access terminals are vulnerable to physical attacks exploiting this flaw. The medium severity rating suggests that while the vulnerability is serious, it requires specific conditions (physical access and existing low-level privileges) to be exploited, somewhat limiting its widespread impact. However, the potential for high-impact consequences necessitates proactive measures to mitigate risk.
Mitigation Recommendations
European organizations should prioritize upgrading systems from Windows 10 Version 1809 to a more recent, supported Windows version where this vulnerability is addressed. Until upgrades are feasible, strict physical security controls must be enforced to prevent unauthorized physical access to devices, including secure storage, access logging, and surveillance. Implementing endpoint security solutions that monitor for unusual privilege escalation attempts can help detect exploitation attempts. Organizations should also review and tighten user privilege assignments to minimize the number of users with low-level privileges that could be leveraged for exploitation. Regular audits of device inventory to identify systems running the affected version are critical. Since no patches are currently available, organizations should monitor Microsoft security advisories for updates and apply patches promptly once released. Additionally, disabling or restricting use of USB video devices where not necessary can reduce the attack surface. Employing full disk encryption can mitigate data confidentiality risks in case of physical device compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-30T15:14:20.992Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb372
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 3:17:37 PM
Last updated: 7/30/2025, 1:44:28 PM
Views: 10
Related Threats
CVE-2025-54466: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache OFBiz
UnknownCVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.