Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27735: CWE-345: Insufficient Verification of Data Authenticity in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-27735cvecve-2025-27735cwe-345
Published: Tue Apr 08 2025 (04/08/2025, 17:24:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:21:47 UTC

Technical Analysis

CVE-2025-27735 is a vulnerability classified under CWE-345 (Insufficient Verification of Data Authenticity) affecting Microsoft Windows 10 Version 1507 (build 10240). The flaw resides in the Windows Virtualization-Based Security (VBS) Enclave, a security feature designed to isolate sensitive processes and data from the rest of the operating system. Due to insufficient verification of data authenticity within the enclave, an attacker who already has local authorized access with high privileges can bypass certain security mechanisms. This bypass could allow the attacker to escalate privileges further or access protected data that should be isolated by the VBS enclave. The CVSS v3.1 score is 6.0 (medium), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), but needs high privileges (PR:H) and no user interaction (UI:N). The impact affects confidentiality and integrity but not availability. The vulnerability is currently not known to be exploited in the wild, and no patches have been released yet. Since Windows 10 Version 1507 is the initial release from 2015, it is largely out of mainstream support, meaning many systems should have been upgraded, but some legacy or specialized environments may still run this version. The vulnerability highlights the risks of running outdated OS versions with legacy security features that have since been improved in later updates.

Potential Impact

For European organizations, the primary impact is the potential for local privilege escalation and bypass of critical security features within the Windows VBS enclave, which protects sensitive processes and data. This could lead to unauthorized access to confidential information or manipulation of system integrity, especially in environments relying on VBS for enhanced security. Although the vulnerability does not affect availability, the compromise of confidentiality and integrity can have severe consequences in sectors such as finance, healthcare, government, and critical infrastructure. Organizations still running Windows 10 Version 1507, particularly in legacy systems or isolated networks, are at risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. The medium severity rating suggests that while the vulnerability is serious, it is not trivial to exploit without existing high privileges, limiting the scope to insider threats or attackers who have already gained some level of system access.

Mitigation Recommendations

1. Upgrade all systems running Windows 10 Version 1507 to the latest supported Windows 10 or Windows 11 versions where VBS and related security features have been enhanced and this vulnerability addressed. 2. Restrict local administrative privileges strictly to trusted personnel and use least privilege principles to reduce the risk of local exploitation. 3. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local privilege escalation attempts or unusual access patterns to VBS enclaves. 4. Isolate legacy systems running outdated OS versions from critical networks and sensitive data environments to limit potential impact. 5. Regularly audit and inventory all Windows versions in use to identify and remediate unsupported or vulnerable systems. 6. Apply any future patches or security updates from Microsoft promptly once available. 7. Consider using hardware-based security features such as TPM and secure boot to complement VBS protections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-06T04:26:08.552Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebbdb

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:21:47 AM

Last updated: 3/26/2026, 8:41:29 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses