Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27477: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-27477cvecve-2025-27477cwe-122
Published: Tue Apr 08 2025 (04/08/2025, 17:23:18 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:17:08 UTC

Technical Analysis

CVE-2025-27477 is a heap-based buffer overflow vulnerability identified in the Windows Telephony Service component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). This vulnerability is classified under CWE-122, indicating that improper handling of memory buffers can lead to overflow conditions. Specifically, the flaw allows an attacker to send specially crafted network packets to the Telephony Service, causing it to overwrite heap memory. This memory corruption can be exploited to execute arbitrary code remotely without requiring any privileges (AV:N/PR:N) but does require user interaction (UI:R), such as the user initiating or accepting a telephony-related connection. The vulnerability affects the confidentiality, integrity, and availability of the system, as successful exploitation could allow full system compromise, including installing malware, stealing data, or disrupting services. The CVSS v3.1 base score is 8.8, reflecting high severity with low attack complexity (AC:L) and no privileges required. Although no public exploits are currently known, the vulnerability is publicly disclosed and thus may attract attacker interest. The affected product is an early release of Windows 10, which is now largely superseded but may still be in use in legacy environments. No official patches are currently linked, indicating that mitigation may rely on upgrading to newer Windows versions or applying out-of-band fixes once available. The Telephony Service is often used in enterprise environments for voice and communication applications, increasing the potential attack surface in organizations relying on these services.

Potential Impact

For European organizations, the impact of CVE-2025-27477 can be significant, especially for those still operating legacy Windows 10 Version 1507 systems. Exploitation could lead to remote code execution, allowing attackers to gain control over affected machines, potentially leading to data breaches, ransomware deployment, or disruption of critical telephony and communication services. This could affect sectors such as telecommunications, finance, healthcare, and government agencies that rely on Windows-based telephony infrastructure. The compromise of telephony services could also disrupt business operations and emergency communication channels. Given the vulnerability requires no authentication and can be triggered remotely, the risk of widespread exploitation is elevated if systems remain unpatched or un-upgraded. The lack of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the likelihood of future exploit development. Organizations with regulatory obligations under GDPR must also consider the legal and reputational consequences of breaches resulting from this vulnerability.

Mitigation Recommendations

1. Immediate upgrade: Organizations should prioritize upgrading all systems running Windows 10 Version 1507 to the latest supported Windows 10 or Windows 11 versions, as this legacy version is no longer supported and lacks security updates. 2. Network segmentation: Isolate systems running legacy Windows 10 from untrusted networks, especially those exposing telephony services, to reduce attack surface. 3. Disable Telephony Service: Where feasible, disable the Windows Telephony Service on systems that do not require it to eliminate the vulnerable attack vector. 4. Monitor network traffic: Implement intrusion detection/prevention systems (IDS/IPS) to detect anomalous or suspicious traffic targeting telephony service ports. 5. Apply vendor patches: Monitor Microsoft security advisories closely and apply any patches or mitigations released for this vulnerability as soon as they become available. 6. User awareness: Educate users about the risks of interacting with unsolicited telephony connections or prompts that could trigger exploitation. 7. Incident response readiness: Prepare for potential exploitation by ensuring backups, endpoint detection and response (EDR) tools, and incident response plans are in place and tested.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.976Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb99

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:17:08 AM

Last updated: 3/24/2026, 5:42:08 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses