Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29809: CWE-922: Insecure Storage of Sensitive Information in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-29809cvecve-2025-29809cwe-922
Published: Tue Apr 08 2025 (04/08/2025, 17:24:15 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:28:27 UTC

Technical Analysis

CVE-2025-29809 is a vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The issue lies in the Windows Kerberos authentication component, where sensitive information is stored insecurely, allowing an authorized local attacker with limited privileges to bypass security mechanisms. This bypass could enable the attacker to access or manipulate sensitive authentication tokens or credentials, compromising the confidentiality and integrity of the system's authentication process. The vulnerability requires local access with privileges but does not require user interaction, making exploitation feasible in scenarios where an attacker has gained limited local access. The CVSS v3.1 base score is 7.1, reflecting high severity due to the high impact on confidentiality and integrity, low attack complexity, and limited privileges required. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vigilance and proactive mitigation. The vulnerability is particularly relevant for environments still running the original Windows 10 release, which is largely superseded by newer versions with improved security controls.

Potential Impact

For European organizations, the impact of CVE-2025-29809 can be significant if legacy Windows 10 Version 1507 systems remain in use, especially in critical infrastructure sectors such as government, manufacturing, and finance where legacy systems are common. Successful exploitation could lead to unauthorized access to sensitive authentication credentials, enabling lateral movement within networks, privilege escalation, or unauthorized data access. This undermines the confidentiality and integrity of authentication processes and could facilitate further attacks such as data breaches or sabotage. Although availability impact is not indicated, the compromise of authentication mechanisms can indirectly disrupt operations. The risk is heightened in environments with weak endpoint security or where local access controls are insufficient. European organizations with strict data protection regulations (e.g., GDPR) face additional compliance risks if sensitive data is exposed due to this vulnerability.

Mitigation Recommendations

1. Upgrade all affected systems from Windows 10 Version 1507 to a supported and fully patched version of Windows 10 or later, as this version is outdated and no longer supported by Microsoft. 2. Apply any security updates or patches released by Microsoft addressing this vulnerability as soon as they become available. 3. Restrict local access to systems, enforcing strict access controls and monitoring to prevent unauthorized users from gaining local privileges. 4. Implement endpoint detection and response (EDR) solutions to detect suspicious activities related to authentication token access or manipulation. 5. Conduct regular audits of systems to identify any legacy Windows 10 Version 1507 installations and prioritize their upgrade or isolation. 6. Employ network segmentation to limit the potential lateral movement of attackers who gain local access. 7. Educate IT staff and users about the risks of running unsupported operating systems and the importance of timely patching and upgrades. 8. Utilize multi-factor authentication (MFA) where possible to reduce the impact of compromised credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T18:19:40.248Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebc38

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:28:27 AM

Last updated: 3/25/2026, 1:36:21 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses