CVE-2025-26675: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 21H2
Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-26675 is an out-of-bounds read vulnerability classified under CWE-125, affecting the Windows Subsystem for Linux (WSL) component in Microsoft Windows 10 Version 21H2 (build 10.0.19044.0). The vulnerability occurs due to improper bounds checking within WSL, allowing an authorized local attacker to read memory beyond allocated buffers. This memory disclosure can lead to elevation of privileges by leaking sensitive kernel or process memory, enabling attackers to bypass security boundaries. Exploitation requires local access with at least limited privileges (PR:L), but no user interaction is needed (UI:N). The vulnerability affects confidentiality, integrity, and availability, as attackers can gain higher privileges and potentially execute arbitrary code or disrupt system operations. The CVSS 3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, and significant impact on system security. No public exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of available patches at the time of publication necessitates interim mitigations and heightened monitoring. This vulnerability is particularly relevant for environments leveraging WSL for development or operational tasks on Windows 10 21H2 systems.
Potential Impact
For European organizations, the impact of CVE-2025-26675 can be substantial. Many enterprises and government agencies rely on Windows 10 21H2 with WSL for development, testing, and operational workflows. An attacker with local access—such as a compromised user account or insider threat—could exploit this vulnerability to escalate privileges to SYSTEM level, gaining full control over affected machines. This could lead to unauthorized access to sensitive data, disruption of critical services, and lateral movement within corporate networks. The confidentiality of intellectual property and personal data could be compromised, violating GDPR and other regulatory requirements. Availability could also be affected if attackers deploy destructive payloads or ransomware after privilege escalation. The vulnerability's local attack vector limits remote exploitation but does not eliminate risk in environments with shared access or weak endpoint security. Organizations in sectors such as finance, healthcare, manufacturing, and government are particularly at risk due to the critical nature of their data and systems.
Mitigation Recommendations
1. Apply official Microsoft security patches immediately once released for Windows 10 Version 21H2 to remediate the vulnerability in WSL. 2. Until patches are available, restrict local access to systems running affected Windows versions by enforcing strict access controls and limiting administrative privileges. 3. Disable or uninstall Windows Subsystem for Linux on endpoints where it is not required to reduce the attack surface. 4. Implement endpoint detection and response (EDR) solutions to monitor for unusual local privilege escalation attempts or anomalous process behavior related to WSL. 5. Enforce strong user authentication and session management to prevent unauthorized local access. 6. Conduct regular audits of user accounts and permissions to identify and remove unnecessary privileges. 7. Educate users about the risks of local exploitation and encourage reporting of suspicious activity. 8. Maintain up-to-date backups and incident response plans to mitigate potential impact from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-26675: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 21H2
Description
Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-26675 is an out-of-bounds read vulnerability classified under CWE-125, affecting the Windows Subsystem for Linux (WSL) component in Microsoft Windows 10 Version 21H2 (build 10.0.19044.0). The vulnerability occurs due to improper bounds checking within WSL, allowing an authorized local attacker to read memory beyond allocated buffers. This memory disclosure can lead to elevation of privileges by leaking sensitive kernel or process memory, enabling attackers to bypass security boundaries. Exploitation requires local access with at least limited privileges (PR:L), but no user interaction is needed (UI:N). The vulnerability affects confidentiality, integrity, and availability, as attackers can gain higher privileges and potentially execute arbitrary code or disrupt system operations. The CVSS 3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, and significant impact on system security. No public exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of available patches at the time of publication necessitates interim mitigations and heightened monitoring. This vulnerability is particularly relevant for environments leveraging WSL for development or operational tasks on Windows 10 21H2 systems.
Potential Impact
For European organizations, the impact of CVE-2025-26675 can be substantial. Many enterprises and government agencies rely on Windows 10 21H2 with WSL for development, testing, and operational workflows. An attacker with local access—such as a compromised user account or insider threat—could exploit this vulnerability to escalate privileges to SYSTEM level, gaining full control over affected machines. This could lead to unauthorized access to sensitive data, disruption of critical services, and lateral movement within corporate networks. The confidentiality of intellectual property and personal data could be compromised, violating GDPR and other regulatory requirements. Availability could also be affected if attackers deploy destructive payloads or ransomware after privilege escalation. The vulnerability's local attack vector limits remote exploitation but does not eliminate risk in environments with shared access or weak endpoint security. Organizations in sectors such as finance, healthcare, manufacturing, and government are particularly at risk due to the critical nature of their data and systems.
Mitigation Recommendations
1. Apply official Microsoft security patches immediately once released for Windows 10 Version 21H2 to remediate the vulnerability in WSL. 2. Until patches are available, restrict local access to systems running affected Windows versions by enforcing strict access controls and limiting administrative privileges. 3. Disable or uninstall Windows Subsystem for Linux on endpoints where it is not required to reduce the attack surface. 4. Implement endpoint detection and response (EDR) solutions to monitor for unusual local privilege escalation attempts or anomalous process behavior related to WSL. 5. Enforce strong user authentication and session management to prevent unauthorized local access. 6. Conduct regular audits of user accounts and permissions to identify and remove unnecessary privileges. 7. Educate users about the risks of local exploitation and encourage reporting of suspicious activity. 8. Maintain up-to-date backups and incident response plans to mitigate potential impact from exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.549Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb5d
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/14/2026, 9:13:08 AM
Last updated: 3/25/2026, 1:40:04 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.