Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27738: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-27738cvecve-2025-27738cwe-284
Published: Tue Apr 08 2025 (04/08/2025, 17:24:11 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:22:23 UTC

Technical Analysis

CVE-2025-27738 is a vulnerability classified under CWE-284 (Improper Access Control) found in the Windows Resilient File System (ReFS) implementation on Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw allows an attacker who is authorized (has valid credentials) and can access the system over a network to disclose sensitive information improperly. This vulnerability arises because the access control mechanisms governing ReFS do not adequately restrict information disclosure, enabling attackers to read data they should not have access to. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates network attack vector, low complexity, privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects only the original Windows 10 release version 1507, which is an older and less commonly used version today but may still be present in legacy or specialized environments. The improper access control in ReFS could allow attackers to exfiltrate sensitive data, potentially leading to information leakage and privacy violations.

Potential Impact

For European organizations, the primary impact of CVE-2025-27738 is the potential unauthorized disclosure of sensitive information stored on ReFS volumes in Windows 10 Version 1507 systems. This could affect confidentiality of corporate data, intellectual property, or personal data subject to GDPR regulations, leading to compliance risks and reputational damage. Since the vulnerability requires authenticated access, insider threats or compromised credentials could be leveraged to exploit it. The lack of impact on integrity and availability reduces the risk of operational disruption but does not eliminate the risk of data breaches. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that may still operate legacy Windows 10 systems with ReFS are particularly vulnerable. The medium severity rating suggests a moderate risk level, but the absence of patches and exploits means organizations should proactively assess exposure and implement mitigations to prevent exploitation.

Mitigation Recommendations

1. Identify and inventory all systems running Windows 10 Version 1507, especially those using ReFS volumes. 2. Restrict network access to these systems using firewalls and network segmentation to limit exposure to authorized users only. 3. Enforce strong authentication and credential management policies to reduce the risk of compromised accounts being used to exploit this vulnerability. 4. Where feasible, disable or avoid using ReFS on affected systems until patches are available. 5. Monitor network traffic and system logs for unusual access patterns or attempts to access ReFS data remotely. 6. Plan and prioritize upgrading affected systems to supported Windows versions with current security updates. 7. Stay informed about Microsoft’s patch releases and apply security updates promptly once available. 8. Conduct regular security awareness training to reduce insider threat risks. These steps go beyond generic advice by focusing on legacy system identification, network access controls, and proactive system upgrades.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-06T04:26:08.552Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebbec

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:22:23 AM

Last updated: 3/24/2026, 7:05:31 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses