Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27481: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-27481cvecve-2025-27481cwe-121
Published: Tue Apr 08 2025 (04/08/2025, 17:23:59 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:18:06 UTC

Technical Analysis

CVE-2025-27481 is a stack-based buffer overflow vulnerability identified in the Windows Telephony Service component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). This vulnerability arises due to improper bounds checking in the handling of network requests by the Telephony Service, which allows an attacker to send specially crafted packets that overflow a stack buffer. The overflow can overwrite the stack memory, enabling arbitrary code execution in the context of the Telephony Service. Since the service is network-facing, the attacker can exploit this remotely without any prior authentication (AV:N, PR:N). However, user interaction is required (UI:R), possibly involving the user initiating or accepting a telephony-related operation. The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) due to the potential for full system compromise. The CVSS 3.1 base score is 8.8, reflecting the high impact and relatively low attack complexity (AC:L). No public exploits have been reported yet, but the vulnerability is critical due to the potential damage and ease of exploitation. The affected Windows 10 Version 1507 is an early release from 2015, which is out of mainstream support, increasing risk for organizations still running this version. The vulnerability is tracked under CWE-121, indicating a classic stack-based buffer overflow issue. No official patches have been linked yet, but mitigation would involve applying security updates or upgrading to a supported Windows version. Network-level protections and service restrictions can reduce exposure.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those still operating legacy Windows 10 Version 1507 systems. Exploitation can lead to remote code execution, enabling attackers to gain full control over affected machines, steal sensitive data, disrupt operations, or deploy ransomware. Critical sectors such as finance, healthcare, energy, and government could face severe operational disruptions and data breaches. The vulnerability's network-based attack vector means that exposed telephony services on enterprise networks or VPNs increase the attack surface. Given the high confidentiality, integrity, and availability impact, organizations could suffer from data loss, system downtime, and reputational damage. The lack of known exploits currently provides a window for proactive mitigation, but the risk of future exploitation remains high. Legacy systems in use in some European countries, especially in public sector and industrial environments, amplify the potential impact.

Mitigation Recommendations

1. Immediate upgrade or migration from Windows 10 Version 1507 to a supported and fully patched Windows version is the most effective mitigation. 2. If upgrading is not immediately feasible, disable the Windows Telephony Service (TapiSrv) to eliminate the attack vector. 3. Restrict network access to the Telephony Service using firewall rules to block inbound traffic on relevant ports from untrusted sources. 4. Employ network intrusion detection systems (NIDS) to monitor for anomalous or malformed telephony-related network traffic. 5. Implement strict network segmentation to isolate legacy systems from critical infrastructure and sensitive data environments. 6. Educate users about the risks and avoid user actions that could trigger the vulnerability, given the requirement for user interaction. 7. Monitor vendor advisories for patches or security updates addressing this vulnerability and apply them promptly once available. 8. Conduct vulnerability scanning and asset inventory to identify all systems running the affected Windows version to prioritize remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.977Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebbac

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:18:06 AM

Last updated: 3/28/2026, 9:14:27 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses