Skip to main content

CVE-2025-29809: CWE-922: Insecure Storage of Sensitive Information in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-29809cvecve-2025-29809cwe-922
Published: Tue Apr 08 2025 (04/08/2025, 17:24:15 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally.

AI-Powered Analysis

AILast updated: 07/11/2025, 05:17:59 UTC

Technical Analysis

CVE-2025-29809 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) involving insecure storage of sensitive information within the Windows Kerberos authentication subsystem. Specifically, this vulnerability falls under CWE-922, which relates to the insecure storage of sensitive data. The flaw allows an authorized local attacker—someone with limited privileges on the affected system—to bypass certain security features by exploiting how sensitive Kerberos credentials or tokens are stored. The vulnerability does not require user interaction and can be exploited with low attack complexity, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:N). The impact on confidentiality and integrity is high, potentially allowing attackers to access or manipulate authentication tokens or credentials, which could lead to privilege escalation or unauthorized access to protected resources. However, availability is not affected. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability is particularly concerning because Kerberos is a core authentication protocol used widely in enterprise environments, and improper handling of its sensitive data can undermine the entire authentication framework on affected Windows 10 systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises relying on Windows 10 Version 1809 in their infrastructure. The insecure storage of Kerberos credentials could enable attackers with local access—such as malicious insiders or attackers who have gained limited foothold—to escalate privileges or move laterally within networks. This could lead to unauthorized access to sensitive corporate data, disruption of authentication services, and potential compromise of identity management systems. Given the widespread use of Windows 10 in European businesses, government agencies, and critical infrastructure sectors, exploitation could result in data breaches, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. The lack of user interaction requirement and low complexity of exploitation increase the threat level, emphasizing the need for prompt mitigation. Although no exploits are known in the wild yet, the vulnerability’s characteristics suggest it could be targeted in future attacks, especially in environments where patching is delayed or legacy systems remain in use.

Mitigation Recommendations

Organizations should prioritize upgrading or patching affected Windows 10 Version 1809 systems as soon as official fixes become available from Microsoft. In the interim, practical mitigations include restricting local access to systems by enforcing strict access controls and monitoring for unusual local activity indicative of privilege escalation attempts. Employing endpoint detection and response (EDR) solutions to detect anomalous behavior related to Kerberos ticket manipulation can help identify exploitation attempts early. Additionally, organizations should audit and minimize the number of users with local privileges, implement strong credential hygiene policies, and consider network segmentation to limit lateral movement. Regularly reviewing and hardening Kerberos configurations, such as ticket lifetimes and encryption types, may reduce exposure. Finally, maintaining up-to-date asset inventories to identify systems running the vulnerable version is critical for targeted remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T18:19:40.248Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebc38

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 5:17:59 AM

Last updated: 7/11/2025, 5:17:59 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats