Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27472: CWE-693: Protection Mechanism Failure in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-27472cvecve-2025-27472cwe-693
Published: Tue Apr 08 2025 (04/08/2025, 17:23:16 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:16:03 UTC

Technical Analysis

CVE-2025-27472 is a vulnerability classified under CWE-693 (Protection Mechanism Failure) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The issue lies in the Mark of the Web (MOTW) security feature, which is designed to mark files downloaded from the internet to enforce security policies when those files are accessed. Due to a flaw in this mechanism, an attacker can bypass these protections remotely over a network, potentially allowing malicious content to execute with fewer restrictions than intended. The vulnerability does not require the attacker to have privileges on the target system (PR:N) but does require user interaction (UI:R), such as opening a crafted file or link. The attack vector is network-based (AV:N), making remote exploitation feasible. The impact affects system integrity and availability (I:L, A:L) but does not compromise confidentiality (C:N). The CVSS v3.1 base score is 5.4, indicating medium severity. No public exploits or patches are currently available, increasing the importance of proactive mitigation. The vulnerability primarily threatens legacy Windows 10 systems, which may still be operational in some organizations despite being superseded by newer versions. This flaw could be leveraged to bypass security controls, potentially leading to execution of malicious code or denial of service conditions.

Potential Impact

For European organizations, the vulnerability poses a moderate risk primarily to legacy Windows 10 Version 1507 systems, which may still be present in industrial control systems, government agencies, or enterprises with slow upgrade cycles. Exploitation could allow attackers to bypass security restrictions intended to prevent execution of untrusted content, potentially leading to system instability or limited unauthorized code execution. While confidentiality is not directly impacted, the integrity and availability of affected systems could be compromised, disrupting business operations or critical services. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering attacks could succeed. Organizations relying on outdated Windows 10 versions are particularly vulnerable, and sectors with high regulatory or operational sensitivity (e.g., energy, transportation, healthcare) could face increased risks. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially as attackers may develop exploits once the vulnerability is publicly known.

Mitigation Recommendations

Given the lack of an official patch, European organizations should prioritize upgrading affected systems to supported Windows 10 versions or later releases where this vulnerability is addressed. Where upgrades are not immediately feasible, implement network-level controls such as restricting inbound traffic to vulnerable systems, deploying intrusion detection/prevention systems tuned to detect suspicious activity related to MOTW bypass attempts, and enforcing strict email and web content filtering to reduce exposure to malicious files requiring user interaction. User education is critical to minimize successful exploitation via social engineering; training users to recognize and avoid opening suspicious links or files can reduce risk. Additionally, applying application whitelisting and endpoint protection solutions that monitor and block unauthorized code execution can provide compensating controls. Regularly auditing systems to identify legacy Windows 10 installations and prioritizing their remediation will reduce the attack surface. Monitoring security advisories for patches or exploit reports related to CVE-2025-27472 is essential to respond promptly when updates become available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.976Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb8f

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:16:03 AM

Last updated: 3/22/2026, 9:50:14 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses