Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24991: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-24991cvecve-2025-24991cwe-125
Published: Tue Mar 11 2025 (03/11/2025, 16:59:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:11:55 UTC

Technical Analysis

CVE-2025-24991 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting the NTFS file system driver in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw arises when the NTFS driver improperly handles certain file system operations, allowing an authorized local attacker to read memory outside the intended buffer boundaries. This out-of-bounds read can lead to unauthorized disclosure of sensitive information residing in adjacent memory regions. Exploitation requires local access and user interaction but does not require elevated privileges, which lowers the barrier somewhat but still limits remote exploitation. The vulnerability does not impact system integrity or availability, focusing solely on confidentiality. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) reflects these characteristics, with a base score of 5.5. No public exploits or active exploitation campaigns have been reported as of the publication date. The vulnerability was reserved in late January 2025 and published in March 2025. No patches were linked at the time of reporting, indicating that organizations should monitor for forthcoming updates from Microsoft. The vulnerability is significant for environments where sensitive data confidentiality is critical and where Windows 10 Version 1809 remains in use, despite being an older release. Attackers with local access could leverage this flaw to extract information that might aid further attacks or data leakage.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information due to the out-of-bounds read in NTFS. This could include exposure of confidential files or memory contents that may contain credentials, encryption keys, or proprietary data. Since the vulnerability requires local access and user interaction, the risk is higher in environments with shared or multi-user systems, or where attackers can trick users into executing malicious actions. Sectors such as finance, healthcare, government, and critical infrastructure are particularly sensitive to confidentiality breaches. The lack of impact on integrity and availability reduces the risk of system disruption but does not diminish the importance of protecting sensitive data. Organizations still running Windows 10 Version 1809, which is an older version, face increased risk due to potentially reduced security support and patch availability. The vulnerability could be leveraged as part of a multi-stage attack chain, making it a valuable target for attackers aiming to escalate privileges or move laterally within networks.

Mitigation Recommendations

1. Upgrade to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1809 is outdated and may no longer receive security updates. 2. Apply any security patches released by Microsoft addressing CVE-2025-24991 immediately upon availability. 3. Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and limiting user permissions to the minimum necessary. 4. Educate users to avoid executing untrusted files or actions that could trigger the vulnerability, reducing the likelihood of user interaction exploitation. 5. Implement endpoint detection and response (EDR) solutions to monitor for unusual local activity indicative of exploitation attempts. 6. Regularly audit and inventory systems to identify those still running vulnerable versions and prioritize their remediation. 7. Use application whitelisting and least privilege principles to minimize the attack surface. 8. In high-security environments, consider isolating legacy systems or using virtualization to contain potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.992Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb374

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 10/21/2025, 8:11:55 PM

Last updated: 11/22/2025, 4:46:14 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats