CVE-2025-27736: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809
Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-27736 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Windows Power Dependency Coordinator component. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. In this case, an authorized attacker with local access can exploit the flaw to disclose sensitive information that should otherwise be protected. The CVSS 3.1 base score is 5.5, reflecting a moderate risk level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The vulnerability does not appear to have known exploits in the wild as of the published date (April 8, 2025), and no patches or remediation links are currently provided. The exposure of sensitive information could involve data that, if disclosed, might aid further attacks or compromise privacy. Since the attacker must have local access and some privileges, this vulnerability is more relevant in environments where multiple users share systems or where attackers can gain limited access through other means. The lack of user interaction means exploitation can be automated or scripted once local access is obtained. The vulnerability affects a specific build of Windows 10 (10.0.17763.0), which corresponds to Version 1809, a version that, while older, is still in use in some enterprise environments. The Windows Power Dependency Coordinator is a system component responsible for managing power dependencies between system components, and a flaw here could leak internal state or configuration details that are sensitive.
Potential Impact
For European organizations, the exposure of sensitive information through this vulnerability could lead to several risks. Confidential data leakage may assist attackers in escalating privileges, conducting lateral movement, or planning more sophisticated attacks. Organizations with shared workstations, development environments, or multi-user systems are particularly at risk. The vulnerability could also impact compliance with data protection regulations such as GDPR if sensitive personal or corporate data is exposed. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust and lead to indirect operational impacts. Since exploitation requires local access and some privileges, the threat is higher in environments with weak internal access controls or where insider threats are a concern. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for vigilance, especially in sectors with high-value targets such as finance, healthcare, and critical infrastructure in Europe.
Mitigation Recommendations
European organizations should prioritize upgrading or patching affected systems once Microsoft releases a security update addressing CVE-2025-27736. Until a patch is available, organizations should enforce strict local access controls, ensuring that only trusted users have login privileges on systems running Windows 10 Version 1809. Implementing robust endpoint security solutions that monitor for unusual local activity can help detect exploitation attempts. Network segmentation and the principle of least privilege should be applied to limit the ability of attackers to gain local access or escalate privileges. Regular audits of user accounts and permissions can reduce the risk of unauthorized local access. Additionally, organizations should consider upgrading from Windows 10 Version 1809 to a more recent, supported version of Windows 10 or Windows 11, as older versions may no longer receive security updates. Security awareness training should emphasize the risks of local access vulnerabilities and encourage reporting of suspicious activity. Finally, monitoring for indicators of compromise related to local privilege abuse or information disclosure can help in early detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-27736: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809
Description
Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-27736 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Windows Power Dependency Coordinator component. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. In this case, an authorized attacker with local access can exploit the flaw to disclose sensitive information that should otherwise be protected. The CVSS 3.1 base score is 5.5, reflecting a moderate risk level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The vulnerability does not appear to have known exploits in the wild as of the published date (April 8, 2025), and no patches or remediation links are currently provided. The exposure of sensitive information could involve data that, if disclosed, might aid further attacks or compromise privacy. Since the attacker must have local access and some privileges, this vulnerability is more relevant in environments where multiple users share systems or where attackers can gain limited access through other means. The lack of user interaction means exploitation can be automated or scripted once local access is obtained. The vulnerability affects a specific build of Windows 10 (10.0.17763.0), which corresponds to Version 1809, a version that, while older, is still in use in some enterprise environments. The Windows Power Dependency Coordinator is a system component responsible for managing power dependencies between system components, and a flaw here could leak internal state or configuration details that are sensitive.
Potential Impact
For European organizations, the exposure of sensitive information through this vulnerability could lead to several risks. Confidential data leakage may assist attackers in escalating privileges, conducting lateral movement, or planning more sophisticated attacks. Organizations with shared workstations, development environments, or multi-user systems are particularly at risk. The vulnerability could also impact compliance with data protection regulations such as GDPR if sensitive personal or corporate data is exposed. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust and lead to indirect operational impacts. Since exploitation requires local access and some privileges, the threat is higher in environments with weak internal access controls or where insider threats are a concern. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for vigilance, especially in sectors with high-value targets such as finance, healthcare, and critical infrastructure in Europe.
Mitigation Recommendations
European organizations should prioritize upgrading or patching affected systems once Microsoft releases a security update addressing CVE-2025-27736. Until a patch is available, organizations should enforce strict local access controls, ensuring that only trusted users have login privileges on systems running Windows 10 Version 1809. Implementing robust endpoint security solutions that monitor for unusual local activity can help detect exploitation attempts. Network segmentation and the principle of least privilege should be applied to limit the ability of attackers to gain local access or escalate privileges. Regular audits of user accounts and permissions can reduce the risk of unauthorized local access. Additionally, organizations should consider upgrading from Windows 10 Version 1809 to a more recent, supported version of Windows 10 or Windows 11, as older versions may no longer receive security updates. Security awareness training should emphasize the risks of local access vulnerabilities and encourage reporting of suspicious activity. Finally, monitoring for indicators of compromise related to local privilege abuse or information disclosure can help in early detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-03-06T04:26:08.552Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebbe8
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 4:49:15 AM
Last updated: 8/16/2025, 10:43:41 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.