CVE-2025-24992: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-24992 is a medium-severity vulnerability identified as a buffer over-read issue (CWE-126) in the Microsoft Windows 10 operating system, specifically version 1809 (build 10.0.17763.0). The vulnerability resides in the Windows NTFS file system driver, where improper handling of certain NTFS data structures can cause the system to read beyond the intended buffer boundaries. This flaw can be exploited by an unauthorized local attacker to disclose sensitive information from memory that should not be accessible. The attack vector requires local access with low attack complexity and no privileges, but it does require user interaction. The vulnerability does not allow modification of data or disruption of system availability, but it compromises confidentiality by leaking potentially sensitive information. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS 3.1 base score is 5.5, reflecting a medium severity level due to the local attack vector and the requirement for user interaction, balanced against the high confidentiality impact and lack of integrity or availability impact. The vulnerability was reserved in late January 2025 and published in March 2025, indicating recent discovery and disclosure. This flaw is significant because NTFS is the primary file system used by Windows 10, and improper memory handling in such a core component can expose sensitive data to local attackers, potentially including user credentials, encryption keys, or other confidential information stored in memory buffers related to NTFS operations.
Potential Impact
For European organizations, the impact of CVE-2025-24992 primarily concerns confidentiality breaches through local information disclosure. Organizations with Windows 10 Version 1809 systems—still in use in some environments—may face risks if attackers gain local access, for example, through compromised user accounts, insider threats, or physical access to devices. The exposure of sensitive information could facilitate further attacks, such as privilege escalation or lateral movement within networks. Although the vulnerability does not directly affect system integrity or availability, the leakage of confidential data can undermine trust, violate data protection regulations such as GDPR, and lead to reputational damage. Sectors with high security requirements, including finance, healthcare, and government agencies, may be particularly sensitive to such leaks. Additionally, organizations relying on legacy systems or delayed patching cycles are more vulnerable. Given that no exploits are currently known in the wild, the immediate risk is moderate, but the potential for future exploitation exists, especially if attackers develop reliable methods to trigger the buffer over-read.
Mitigation Recommendations
To mitigate CVE-2025-24992, European organizations should prioritize upgrading affected systems to a newer, supported Windows 10 version or later, as version 1809 is nearing or past end-of-support status. If upgrading is not immediately feasible, organizations should implement strict local access controls, including enforcing strong authentication, limiting user privileges, and employing endpoint protection solutions that monitor for suspicious local activity. Physical security measures should be enhanced to prevent unauthorized device access. Additionally, organizations should monitor for any security advisories or patches released by Microsoft addressing this vulnerability and apply them promptly once available. Conducting regular audits to identify systems running the vulnerable version and isolating or decommissioning them can reduce exposure. Employing memory protection technologies and enabling Windows Defender Exploit Guard features may also help mitigate exploitation attempts. User education to avoid executing untrusted code or opening suspicious files is recommended to reduce the risk of triggering the vulnerability through user interaction.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-24992: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Description
Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-24992 is a medium-severity vulnerability identified as a buffer over-read issue (CWE-126) in the Microsoft Windows 10 operating system, specifically version 1809 (build 10.0.17763.0). The vulnerability resides in the Windows NTFS file system driver, where improper handling of certain NTFS data structures can cause the system to read beyond the intended buffer boundaries. This flaw can be exploited by an unauthorized local attacker to disclose sensitive information from memory that should not be accessible. The attack vector requires local access with low attack complexity and no privileges, but it does require user interaction. The vulnerability does not allow modification of data or disruption of system availability, but it compromises confidentiality by leaking potentially sensitive information. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS 3.1 base score is 5.5, reflecting a medium severity level due to the local attack vector and the requirement for user interaction, balanced against the high confidentiality impact and lack of integrity or availability impact. The vulnerability was reserved in late January 2025 and published in March 2025, indicating recent discovery and disclosure. This flaw is significant because NTFS is the primary file system used by Windows 10, and improper memory handling in such a core component can expose sensitive data to local attackers, potentially including user credentials, encryption keys, or other confidential information stored in memory buffers related to NTFS operations.
Potential Impact
For European organizations, the impact of CVE-2025-24992 primarily concerns confidentiality breaches through local information disclosure. Organizations with Windows 10 Version 1809 systems—still in use in some environments—may face risks if attackers gain local access, for example, through compromised user accounts, insider threats, or physical access to devices. The exposure of sensitive information could facilitate further attacks, such as privilege escalation or lateral movement within networks. Although the vulnerability does not directly affect system integrity or availability, the leakage of confidential data can undermine trust, violate data protection regulations such as GDPR, and lead to reputational damage. Sectors with high security requirements, including finance, healthcare, and government agencies, may be particularly sensitive to such leaks. Additionally, organizations relying on legacy systems or delayed patching cycles are more vulnerable. Given that no exploits are currently known in the wild, the immediate risk is moderate, but the potential for future exploitation exists, especially if attackers develop reliable methods to trigger the buffer over-read.
Mitigation Recommendations
To mitigate CVE-2025-24992, European organizations should prioritize upgrading affected systems to a newer, supported Windows 10 version or later, as version 1809 is nearing or past end-of-support status. If upgrading is not immediately feasible, organizations should implement strict local access controls, including enforcing strong authentication, limiting user privileges, and employing endpoint protection solutions that monitor for suspicious local activity. Physical security measures should be enhanced to prevent unauthorized device access. Additionally, organizations should monitor for any security advisories or patches released by Microsoft addressing this vulnerability and apply them promptly once available. Conducting regular audits to identify systems running the vulnerable version and isolating or decommissioning them can reduce exposure. Employing memory protection technologies and enabling Windows Defender Exploit Guard features may also help mitigate exploitation attempts. User education to avoid executing untrusted code or opening suspicious files is recommended to reduce the risk of triggering the vulnerability through user interaction.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-30T15:14:20.992Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb376
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 3:18:19 PM
Last updated: 8/16/2025, 12:45:42 PM
Views: 21
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.