Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26678: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-26678cvecve-2025-26678cwe-284
Published: Tue Apr 08 2025 (04/08/2025, 17:23:55 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:13:34 UTC

Technical Analysis

CVE-2025-26678 is a vulnerability classified under CWE-284 (Improper Access Control) found in Microsoft Windows 10 Version 1809, specifically targeting Windows Defender Application Control (WDAC). WDAC is a security feature designed to enforce application whitelisting policies, preventing unauthorized or malicious code execution. This vulnerability allows an attacker with local access but no privileges (no authentication required) to bypass WDAC protections, effectively undermining the integrity and security posture of the system. The attacker does not require user interaction, making exploitation more straightforward once local access is obtained. The CVSS 3.1 base score of 8.4 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no public exploits are known yet, the vulnerability's nature suggests that attackers could leverage it to run unauthorized code, escalate privileges, or disable security controls. The affected version is Windows 10 1809 (build 10.0.17763.0), which is an older release but still in use in some environments. No patches or mitigations have been officially released at the time of publication, increasing the urgency for defensive measures.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Windows 10 Version 1809 in operational environments where WDAC is deployed to enforce strict application control policies. Successful exploitation could lead to unauthorized code execution, data breaches, and disruption of critical services. The compromise of WDAC undermines a key security layer, potentially allowing malware or insider threats to bypass application whitelisting. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where data confidentiality and system integrity are paramount. The local attack vector means that physical or remote local access to machines is required, which could be feasible in environments with shared workstations or insufficient endpoint security. The lack of user interaction and privileges needed makes this vulnerability easier to exploit once access is gained, increasing the threat level. Given the widespread use of Windows 10 in Europe, the potential impact is broad, affecting both private and public sector entities.

Mitigation Recommendations

1. Restrict local access to systems running Windows 10 Version 1809, enforcing strict physical and logical access controls. 2. Implement robust endpoint detection and response (EDR) solutions to monitor for unusual activity indicative of WDAC bypass attempts. 3. Enforce network segmentation to limit lateral movement if local access is compromised. 4. Prioritize upgrading affected systems to newer, supported Windows versions where this vulnerability is patched or does not exist. 5. Apply principle of least privilege to user accounts to reduce the risk of local exploitation. 6. Monitor Windows event logs and WDAC logs for anomalies or unauthorized policy changes. 7. Prepare incident response plans specifically addressing potential WDAC bypass scenarios. 8. Stay alert for official patches or updates from Microsoft and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.550Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb6c

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:13:34 AM

Last updated: 3/22/2026, 3:59:04 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses