Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26648: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-26648cvecve-2025-26648cwe-591cwe-416
Published: Tue Apr 08 2025 (04/08/2025, 17:23:47 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:09:43 UTC

Technical Analysis

CVE-2025-26648 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10240) involving improper locking of sensitive data in memory within the Windows Kernel. The weakness falls under CWE-591, which relates to sensitive data storage in improperly locked memory, potentially allowing unauthorized access to sensitive information. In this case, the vulnerability enables an authorized local attacker—someone with limited privileges on the system—to elevate their privileges to a higher level, such as SYSTEM or Administrator. This occurs because the kernel fails to properly lock memory regions containing sensitive data, allowing the attacker to read or manipulate this data to bypass security controls. The vulnerability does not require user interaction but does require local access with some privileges, making it a local privilege escalation (LPE) issue. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. No public exploits are currently known, but the vulnerability is critical for environments still running this early Windows 10 version, which is no longer supported and lacks security updates. The flaw could be exploited to gain full control over affected systems, leading to data breaches, system compromise, or disruption of services. The vulnerability was reserved in February 2025 and published in April 2025, indicating recent discovery and disclosure. No patch links are provided, suggesting that remediation may require upgrading to a newer Windows version or awaiting a security update from Microsoft.

Potential Impact

For European organizations, the impact of CVE-2025-26648 is significant, particularly for those still operating legacy Windows 10 Version 1507 systems. Successful exploitation allows attackers to escalate privileges locally, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, and lateral movement within networks. Sectors such as government, healthcare, finance, and critical infrastructure that rely on Windows-based systems are at heightened risk. The confidentiality of sensitive information is at risk due to improper memory handling, while integrity and availability can be compromised through unauthorized administrative actions. Although exploitation requires local access, insider threats or attackers who gain initial footholds via other means could leverage this vulnerability to deepen their control. The lack of known exploits in the wild currently reduces immediate risk, but the high severity and ease of exploitation once local access is obtained make it a priority for mitigation. European organizations with legacy systems may face compliance and regulatory risks if this vulnerability is not addressed.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 (build 10240) to a supported and fully patched Windows version, as this early release is no longer supported and lacks security updates. 2. If upgrading is not immediately possible, restrict local access to affected systems by enforcing strict access controls and limiting administrative privileges to trusted personnel only. 3. Implement endpoint detection and response (EDR) solutions capable of detecting unusual privilege escalation attempts and kernel memory access anomalies. 4. Regularly audit and monitor logs for signs of local privilege escalation or suspicious activity indicative of exploitation attempts. 5. Employ application whitelisting and least privilege principles to reduce the attack surface and limit the ability of attackers to execute arbitrary code. 6. Isolate legacy systems from critical network segments to contain potential compromises. 7. Stay informed about updates from Microsoft regarding patches or workarounds for this vulnerability and apply them promptly once available. 8. Conduct user training and awareness to reduce the risk of initial local access by attackers through phishing or social engineering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T19:23:29.269Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb32

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:09:43 AM

Last updated: 3/25/2026, 12:47:29 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses