Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26675: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 21H2

0
High
VulnerabilityCVE-2025-26675cvecve-2025-26675cwe-125
Published: Tue Apr 08 2025 (04/08/2025, 17:23:54 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 21H2

Description

Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:13:08 UTC

Technical Analysis

CVE-2025-26675 is an out-of-bounds read vulnerability classified under CWE-125, affecting the Windows Subsystem for Linux (WSL) component in Microsoft Windows 10 Version 21H2 (build 10.0.19044.0). The vulnerability occurs due to improper bounds checking within WSL, allowing an authorized local attacker to read memory beyond allocated buffers. This memory disclosure can lead to elevation of privileges by leaking sensitive kernel or process memory, enabling attackers to bypass security boundaries. Exploitation requires local access with at least limited privileges (PR:L), but no user interaction is needed (UI:N). The vulnerability affects confidentiality, integrity, and availability, as attackers can gain higher privileges and potentially execute arbitrary code or disrupt system operations. The CVSS 3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, and significant impact on system security. No public exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of available patches at the time of publication necessitates interim mitigations and heightened monitoring. This vulnerability is particularly relevant for environments leveraging WSL for development or operational tasks on Windows 10 21H2 systems.

Potential Impact

For European organizations, the impact of CVE-2025-26675 can be substantial. Many enterprises and government agencies rely on Windows 10 21H2 with WSL for development, testing, and operational workflows. An attacker with local access—such as a compromised user account or insider threat—could exploit this vulnerability to escalate privileges to SYSTEM level, gaining full control over affected machines. This could lead to unauthorized access to sensitive data, disruption of critical services, and lateral movement within corporate networks. The confidentiality of intellectual property and personal data could be compromised, violating GDPR and other regulatory requirements. Availability could also be affected if attackers deploy destructive payloads or ransomware after privilege escalation. The vulnerability's local attack vector limits remote exploitation but does not eliminate risk in environments with shared access or weak endpoint security. Organizations in sectors such as finance, healthcare, manufacturing, and government are particularly at risk due to the critical nature of their data and systems.

Mitigation Recommendations

1. Apply official Microsoft security patches immediately once released for Windows 10 Version 21H2 to remediate the vulnerability in WSL. 2. Until patches are available, restrict local access to systems running affected Windows versions by enforcing strict access controls and limiting administrative privileges. 3. Disable or uninstall Windows Subsystem for Linux on endpoints where it is not required to reduce the attack surface. 4. Implement endpoint detection and response (EDR) solutions to monitor for unusual local privilege escalation attempts or anomalous process behavior related to WSL. 5. Enforce strong user authentication and session management to prevent unauthorized local access. 6. Conduct regular audits of user accounts and permissions to identify and remove unnecessary privileges. 7. Educate users about the risks of local exploitation and encourage reporting of suspicious activity. 8. Maintain up-to-date backups and incident response plans to mitigate potential impact from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.549Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb5d

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:13:08 AM

Last updated: 3/25/2026, 1:40:04 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses