Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25004: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-25004cvecve-2025-25004cwe-284
Published: Tue Oct 14 2025 (10/14/2025, 17:00:54 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 10/14/2025, 17:23:38 UTC

Technical Analysis

CVE-2025-25004 is a vulnerability categorized under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1809, specifically related to Microsoft PowerShell. The flaw arises from insufficient enforcement of access control policies within PowerShell, allowing an attacker who already has some level of authorized local access to escalate their privileges beyond their current rights. This means that a user with limited permissions can exploit this vulnerability to gain elevated privileges, potentially up to SYSTEM level, thereby gaining full control over the affected system. The vulnerability requires local access and some user interaction, such as executing a crafted PowerShell command or script. The CVSS v3.1 base score is 7.3, indicating a high severity level, with attack vector local (AV:L), low attack complexity (AC:L), privileges required (PR:L), and user interaction required (UI:R). The impact metrics are high for confidentiality, integrity, and availability, meaning exploitation could lead to complete system compromise. No public exploits or proof-of-concept code are known at this time, but the vulnerability is published and should be considered a significant risk. The affected version is Windows 10 Version 1809 (build 10.0.17763.0), which is an older release but still in use in some organizations. The lack of patch links suggests that a fix may not yet be publicly available or is pending release. The vulnerability's root cause is improper access control in PowerShell, which is a critical administrative tool widely used for system management and automation, making this vulnerability particularly dangerous if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-25004 can be severe, especially in environments where Windows 10 Version 1809 is still deployed. Successful exploitation allows attackers to elevate privileges locally, potentially leading to full system compromise, unauthorized data access, and disruption of services. This can affect confidentiality by exposing sensitive data, integrity by allowing unauthorized changes to system configurations or data, and availability by enabling denial-of-service conditions or ransomware deployment. Organizations in sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk due to the sensitive nature of their data and operations. The local attack vector means that insider threats or attackers who have gained initial footholds via phishing or other means could leverage this vulnerability to escalate privileges and move laterally within networks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers often develop exploits rapidly after public disclosure. The continued use of legacy Windows versions in some European enterprises and public sector entities increases the potential attack surface. Additionally, the reliance on PowerShell for automation and administration in many organizations amplifies the risk, as compromised elevated privileges can be used to execute malicious scripts or disable security controls.

Mitigation Recommendations

1. Upgrade affected systems to a newer, supported version of Windows 10 or Windows 11 where this vulnerability is patched. 2. If upgrading is not immediately possible, restrict local access to systems running Windows 10 Version 1809, limiting user accounts to only those necessary and enforcing the principle of least privilege. 3. Implement strict PowerShell execution policies to restrict the running of unauthorized scripts and commands, including enabling PowerShell logging and transcription to monitor suspicious activity. 4. Use application control solutions (e.g., Microsoft AppLocker or Windows Defender Application Control) to prevent execution of untrusted PowerShell scripts. 5. Employ endpoint detection and response (EDR) tools to detect anomalous privilege escalation attempts and PowerShell misuse. 6. Regularly audit user privileges and remove unnecessary administrative rights to reduce the risk of privilege escalation. 7. Educate users about the risks of executing untrusted scripts and the importance of reporting suspicious activity. 8. Monitor for indicators of compromise related to privilege escalation and PowerShell abuse. 9. Apply any security updates or patches from Microsoft as soon as they become available for this vulnerability. 10. Consider network segmentation to limit the spread of an attacker who gains elevated privileges on one system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.994Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85823dd1bfb0b7e3e08f

Added to database: 10/14/2025, 5:16:50 PM

Last enriched: 10/14/2025, 5:23:38 PM

Last updated: 10/16/2025, 12:38:55 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats