CVE-2025-26678: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809
Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.
AI Analysis
Technical Summary
CVE-2025-26678 is a vulnerability classified under CWE-284 (Improper Access Control) found in Microsoft Windows 10 Version 1809, specifically targeting Windows Defender Application Control (WDAC). WDAC is a security feature designed to enforce application whitelisting policies, preventing unauthorized or malicious code execution. This vulnerability allows an attacker with local access but no privileges (no authentication required) to bypass WDAC protections, effectively undermining the integrity and security posture of the system. The attacker does not require user interaction, making exploitation more straightforward once local access is obtained. The CVSS 3.1 base score of 8.4 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no public exploits are known yet, the vulnerability's nature suggests that attackers could leverage it to run unauthorized code, escalate privileges, or disable security controls. The affected version is Windows 10 1809 (build 10.0.17763.0), which is an older release but still in use in some environments. No patches or mitigations have been officially released at the time of publication, increasing the urgency for defensive measures.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Windows 10 Version 1809 in operational environments where WDAC is deployed to enforce strict application control policies. Successful exploitation could lead to unauthorized code execution, data breaches, and disruption of critical services. The compromise of WDAC undermines a key security layer, potentially allowing malware or insider threats to bypass application whitelisting. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where data confidentiality and system integrity are paramount. The local attack vector means that physical or remote local access to machines is required, which could be feasible in environments with shared workstations or insufficient endpoint security. The lack of user interaction and privileges needed makes this vulnerability easier to exploit once access is gained, increasing the threat level. Given the widespread use of Windows 10 in Europe, the potential impact is broad, affecting both private and public sector entities.
Mitigation Recommendations
1. Restrict local access to systems running Windows 10 Version 1809, enforcing strict physical and logical access controls. 2. Implement robust endpoint detection and response (EDR) solutions to monitor for unusual activity indicative of WDAC bypass attempts. 3. Enforce network segmentation to limit lateral movement if local access is compromised. 4. Prioritize upgrading affected systems to newer, supported Windows versions where this vulnerability is patched or does not exist. 5. Apply principle of least privilege to user accounts to reduce the risk of local exploitation. 6. Monitor Windows event logs and WDAC logs for anomalies or unauthorized policy changes. 7. Prepare incident response plans specifically addressing potential WDAC bypass scenarios. 8. Stay alert for official patches or updates from Microsoft and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-26678: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809
Description
Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-26678 is a vulnerability classified under CWE-284 (Improper Access Control) found in Microsoft Windows 10 Version 1809, specifically targeting Windows Defender Application Control (WDAC). WDAC is a security feature designed to enforce application whitelisting policies, preventing unauthorized or malicious code execution. This vulnerability allows an attacker with local access but no privileges (no authentication required) to bypass WDAC protections, effectively undermining the integrity and security posture of the system. The attacker does not require user interaction, making exploitation more straightforward once local access is obtained. The CVSS 3.1 base score of 8.4 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no public exploits are known yet, the vulnerability's nature suggests that attackers could leverage it to run unauthorized code, escalate privileges, or disable security controls. The affected version is Windows 10 1809 (build 10.0.17763.0), which is an older release but still in use in some environments. No patches or mitigations have been officially released at the time of publication, increasing the urgency for defensive measures.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Windows 10 Version 1809 in operational environments where WDAC is deployed to enforce strict application control policies. Successful exploitation could lead to unauthorized code execution, data breaches, and disruption of critical services. The compromise of WDAC undermines a key security layer, potentially allowing malware or insider threats to bypass application whitelisting. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where data confidentiality and system integrity are paramount. The local attack vector means that physical or remote local access to machines is required, which could be feasible in environments with shared workstations or insufficient endpoint security. The lack of user interaction and privileges needed makes this vulnerability easier to exploit once access is gained, increasing the threat level. Given the widespread use of Windows 10 in Europe, the potential impact is broad, affecting both private and public sector entities.
Mitigation Recommendations
1. Restrict local access to systems running Windows 10 Version 1809, enforcing strict physical and logical access controls. 2. Implement robust endpoint detection and response (EDR) solutions to monitor for unusual activity indicative of WDAC bypass attempts. 3. Enforce network segmentation to limit lateral movement if local access is compromised. 4. Prioritize upgrading affected systems to newer, supported Windows versions where this vulnerability is patched or does not exist. 5. Apply principle of least privilege to user accounts to reduce the risk of local exploitation. 6. Monitor Windows event logs and WDAC logs for anomalies or unauthorized policy changes. 7. Prepare incident response plans specifically addressing potential WDAC bypass scenarios. 8. Stay alert for official patches or updates from Microsoft and apply them promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.550Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb6c
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/14/2026, 9:13:34 AM
Last updated: 3/26/2026, 9:22:10 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.