Skip to main content

CVE-2025-24992: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-24992cvecve-2025-24992cwe-126
Published: Tue Mar 11 2025 (03/11/2025, 16:59:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 07/11/2025, 15:18:19 UTC

Technical Analysis

CVE-2025-24992 is a medium-severity vulnerability identified as a buffer over-read issue (CWE-126) in the Microsoft Windows 10 operating system, specifically version 1809 (build 10.0.17763.0). The vulnerability resides in the Windows NTFS file system driver, where improper handling of certain NTFS data structures can cause the system to read beyond the intended buffer boundaries. This flaw can be exploited by an unauthorized local attacker to disclose sensitive information from memory that should not be accessible. The attack vector requires local access with low attack complexity and no privileges, but it does require user interaction. The vulnerability does not allow modification of data or disruption of system availability, but it compromises confidentiality by leaking potentially sensitive information. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS 3.1 base score is 5.5, reflecting a medium severity level due to the local attack vector and the requirement for user interaction, balanced against the high confidentiality impact and lack of integrity or availability impact. The vulnerability was reserved in late January 2025 and published in March 2025, indicating recent discovery and disclosure. This flaw is significant because NTFS is the primary file system used by Windows 10, and improper memory handling in such a core component can expose sensitive data to local attackers, potentially including user credentials, encryption keys, or other confidential information stored in memory buffers related to NTFS operations.

Potential Impact

For European organizations, the impact of CVE-2025-24992 primarily concerns confidentiality breaches through local information disclosure. Organizations with Windows 10 Version 1809 systems—still in use in some environments—may face risks if attackers gain local access, for example, through compromised user accounts, insider threats, or physical access to devices. The exposure of sensitive information could facilitate further attacks, such as privilege escalation or lateral movement within networks. Although the vulnerability does not directly affect system integrity or availability, the leakage of confidential data can undermine trust, violate data protection regulations such as GDPR, and lead to reputational damage. Sectors with high security requirements, including finance, healthcare, and government agencies, may be particularly sensitive to such leaks. Additionally, organizations relying on legacy systems or delayed patching cycles are more vulnerable. Given that no exploits are currently known in the wild, the immediate risk is moderate, but the potential for future exploitation exists, especially if attackers develop reliable methods to trigger the buffer over-read.

Mitigation Recommendations

To mitigate CVE-2025-24992, European organizations should prioritize upgrading affected systems to a newer, supported Windows 10 version or later, as version 1809 is nearing or past end-of-support status. If upgrading is not immediately feasible, organizations should implement strict local access controls, including enforcing strong authentication, limiting user privileges, and employing endpoint protection solutions that monitor for suspicious local activity. Physical security measures should be enhanced to prevent unauthorized device access. Additionally, organizations should monitor for any security advisories or patches released by Microsoft addressing this vulnerability and apply them promptly once available. Conducting regular audits to identify systems running the vulnerable version and isolating or decommissioning them can reduce exposure. Employing memory protection technologies and enabling Windows Defender Exploit Guard features may also help mitigate exploitation attempts. User education to avoid executing untrusted code or opening suspicious files is recommended to reduce the risk of triggering the vulnerability through user interaction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.992Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb376

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 3:18:19 PM

Last updated: 8/16/2025, 12:45:42 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats