CVE-2025-24991: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-24991 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting the NTFS file system driver in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw arises when the NTFS driver improperly handles certain file system operations, allowing an authorized local attacker to read memory outside the intended buffer boundaries. This out-of-bounds read can lead to unauthorized disclosure of sensitive information residing in adjacent memory regions. Exploitation requires local access and user interaction but does not require elevated privileges, which lowers the barrier somewhat but still limits remote exploitation. The vulnerability does not impact system integrity or availability, focusing solely on confidentiality. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) reflects these characteristics, with a base score of 5.5. No public exploits or active exploitation campaigns have been reported as of the publication date. The vulnerability was reserved in late January 2025 and published in March 2025. No patches were linked at the time of reporting, indicating that organizations should monitor for forthcoming updates from Microsoft. The vulnerability is significant for environments where sensitive data confidentiality is critical and where Windows 10 Version 1809 remains in use, despite being an older release. Attackers with local access could leverage this flaw to extract information that might aid further attacks or data leakage.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information due to the out-of-bounds read in NTFS. This could include exposure of confidential files or memory contents that may contain credentials, encryption keys, or proprietary data. Since the vulnerability requires local access and user interaction, the risk is higher in environments with shared or multi-user systems, or where attackers can trick users into executing malicious actions. Sectors such as finance, healthcare, government, and critical infrastructure are particularly sensitive to confidentiality breaches. The lack of impact on integrity and availability reduces the risk of system disruption but does not diminish the importance of protecting sensitive data. Organizations still running Windows 10 Version 1809, which is an older version, face increased risk due to potentially reduced security support and patch availability. The vulnerability could be leveraged as part of a multi-stage attack chain, making it a valuable target for attackers aiming to escalate privileges or move laterally within networks.
Mitigation Recommendations
1. Upgrade to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1809 is outdated and may no longer receive security updates. 2. Apply any security patches released by Microsoft addressing CVE-2025-24991 immediately upon availability. 3. Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and limiting user permissions to the minimum necessary. 4. Educate users to avoid executing untrusted files or actions that could trigger the vulnerability, reducing the likelihood of user interaction exploitation. 5. Implement endpoint detection and response (EDR) solutions to monitor for unusual local activity indicative of exploitation attempts. 6. Regularly audit and inventory systems to identify those still running vulnerable versions and prioritize their remediation. 7. Use application whitelisting and least privilege principles to minimize the attack surface. 8. In high-security environments, consider isolating legacy systems or using virtualization to contain potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-24991: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-24991 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting the NTFS file system driver in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw arises when the NTFS driver improperly handles certain file system operations, allowing an authorized local attacker to read memory outside the intended buffer boundaries. This out-of-bounds read can lead to unauthorized disclosure of sensitive information residing in adjacent memory regions. Exploitation requires local access and user interaction but does not require elevated privileges, which lowers the barrier somewhat but still limits remote exploitation. The vulnerability does not impact system integrity or availability, focusing solely on confidentiality. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) reflects these characteristics, with a base score of 5.5. No public exploits or active exploitation campaigns have been reported as of the publication date. The vulnerability was reserved in late January 2025 and published in March 2025. No patches were linked at the time of reporting, indicating that organizations should monitor for forthcoming updates from Microsoft. The vulnerability is significant for environments where sensitive data confidentiality is critical and where Windows 10 Version 1809 remains in use, despite being an older release. Attackers with local access could leverage this flaw to extract information that might aid further attacks or data leakage.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information due to the out-of-bounds read in NTFS. This could include exposure of confidential files or memory contents that may contain credentials, encryption keys, or proprietary data. Since the vulnerability requires local access and user interaction, the risk is higher in environments with shared or multi-user systems, or where attackers can trick users into executing malicious actions. Sectors such as finance, healthcare, government, and critical infrastructure are particularly sensitive to confidentiality breaches. The lack of impact on integrity and availability reduces the risk of system disruption but does not diminish the importance of protecting sensitive data. Organizations still running Windows 10 Version 1809, which is an older version, face increased risk due to potentially reduced security support and patch availability. The vulnerability could be leveraged as part of a multi-stage attack chain, making it a valuable target for attackers aiming to escalate privileges or move laterally within networks.
Mitigation Recommendations
1. Upgrade to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1809 is outdated and may no longer receive security updates. 2. Apply any security patches released by Microsoft addressing CVE-2025-24991 immediately upon availability. 3. Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and limiting user permissions to the minimum necessary. 4. Educate users to avoid executing untrusted files or actions that could trigger the vulnerability, reducing the likelihood of user interaction exploitation. 5. Implement endpoint detection and response (EDR) solutions to monitor for unusual local activity indicative of exploitation attempts. 6. Regularly audit and inventory systems to identify those still running vulnerable versions and prioritize their remediation. 7. Use application whitelisting and least privilege principles to minimize the attack surface. 8. In high-security environments, consider isolating legacy systems or using virtualization to contain potential exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-30T15:14:20.992Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb374
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 10/21/2025, 8:11:55 PM
Last updated: 11/22/2025, 4:46:14 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.