CVE-2025-29974: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809
Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.
AI Analysis
Technical Summary
CVE-2025-29974 is an integer underflow vulnerability identified in the Windows Kernel component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises due to improper handling of integer values, specifically an underflow (wrap or wraparound) condition. This flaw can be triggered remotely by an unauthorized attacker over an adjacent network, meaning the attacker must be on the same local network segment or connected via a network that allows direct Layer 2 communication. Exploiting this vulnerability allows the attacker to disclose sensitive information from the affected system, compromising confidentiality. The vulnerability does not allow for integrity or availability impacts, nor does it require any privileges or authentication, but it does require some user interaction. The CVSS v3.1 base score is 5.7, categorizing it as a medium severity issue. The attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H), but none on integrity (I:N) or availability (A:N). There are no known exploits in the wild at the time of publication, and no patches or mitigation links have been provided yet. The vulnerability is related to CWE-191 (Integer Underflow) and also tagged with CWE-125, which relates to out-of-bounds read, suggesting that the underflow may lead to memory disclosure. This vulnerability is significant because the Windows Kernel is a core component, and flaws here can have broad security implications. However, the requirement for user interaction and adjacency limits the attack surface somewhat.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments still running Windows 10 Version 1809, which is an older release and may still be present in legacy systems or specialized industrial environments. The ability for an attacker on the same local network to disclose sensitive information could lead to leakage of confidential data, including credentials, internal communications, or other protected information. This could facilitate further attacks such as lateral movement, privilege escalation, or targeted espionage. Sectors with high-value intellectual property or sensitive personal data, such as finance, healthcare, government, and critical infrastructure, could be particularly impacted. The medium severity rating reflects that while the vulnerability does not allow direct system compromise or denial of service, the confidentiality breach could undermine trust and compliance with data protection regulations like GDPR. Additionally, the requirement for user interaction and adjacency means that remote exploitation over the internet is unlikely, but insider threats or compromised devices within the network could exploit this vulnerability to escalate their access to sensitive data.
Mitigation Recommendations
Given the lack of an official patch at the time of this report, European organizations should implement network segmentation to limit adjacency exposure, ensuring that sensitive systems running Windows 10 Version 1809 are isolated from less trusted network segments. Employ strict access controls and monitoring on local networks to detect unusual activity indicative of exploitation attempts. Disable or restrict unnecessary local network services and protocols that could be leveraged to trigger the vulnerability. Enforce strong user awareness training to minimize risky user interactions that could facilitate exploitation. Where possible, upgrade affected systems to a more recent, supported version of Windows 10 or Windows 11 that does not contain this vulnerability. Employ endpoint detection and response (EDR) solutions capable of identifying anomalous kernel-level activity. Additionally, conduct regular vulnerability assessments and penetration tests focusing on local network attack vectors. Finally, maintain up-to-date backups and incident response plans to quickly address any potential breaches stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-29974: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809
Description
Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.
AI-Powered Analysis
Technical Analysis
CVE-2025-29974 is an integer underflow vulnerability identified in the Windows Kernel component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises due to improper handling of integer values, specifically an underflow (wrap or wraparound) condition. This flaw can be triggered remotely by an unauthorized attacker over an adjacent network, meaning the attacker must be on the same local network segment or connected via a network that allows direct Layer 2 communication. Exploiting this vulnerability allows the attacker to disclose sensitive information from the affected system, compromising confidentiality. The vulnerability does not allow for integrity or availability impacts, nor does it require any privileges or authentication, but it does require some user interaction. The CVSS v3.1 base score is 5.7, categorizing it as a medium severity issue. The attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H), but none on integrity (I:N) or availability (A:N). There are no known exploits in the wild at the time of publication, and no patches or mitigation links have been provided yet. The vulnerability is related to CWE-191 (Integer Underflow) and also tagged with CWE-125, which relates to out-of-bounds read, suggesting that the underflow may lead to memory disclosure. This vulnerability is significant because the Windows Kernel is a core component, and flaws here can have broad security implications. However, the requirement for user interaction and adjacency limits the attack surface somewhat.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments still running Windows 10 Version 1809, which is an older release and may still be present in legacy systems or specialized industrial environments. The ability for an attacker on the same local network to disclose sensitive information could lead to leakage of confidential data, including credentials, internal communications, or other protected information. This could facilitate further attacks such as lateral movement, privilege escalation, or targeted espionage. Sectors with high-value intellectual property or sensitive personal data, such as finance, healthcare, government, and critical infrastructure, could be particularly impacted. The medium severity rating reflects that while the vulnerability does not allow direct system compromise or denial of service, the confidentiality breach could undermine trust and compliance with data protection regulations like GDPR. Additionally, the requirement for user interaction and adjacency means that remote exploitation over the internet is unlikely, but insider threats or compromised devices within the network could exploit this vulnerability to escalate their access to sensitive data.
Mitigation Recommendations
Given the lack of an official patch at the time of this report, European organizations should implement network segmentation to limit adjacency exposure, ensuring that sensitive systems running Windows 10 Version 1809 are isolated from less trusted network segments. Employ strict access controls and monitoring on local networks to detect unusual activity indicative of exploitation attempts. Disable or restrict unnecessary local network services and protocols that could be leveraged to trigger the vulnerability. Enforce strong user awareness training to minimize risky user interactions that could facilitate exploitation. Where possible, upgrade affected systems to a more recent, supported version of Windows 10 or Windows 11 that does not contain this vulnerability. Employ endpoint detection and response (EDR) solutions capable of identifying anomalous kernel-level activity. Additionally, conduct regular vulnerability assessments and penetration tests focusing on local network attack vectors. Finally, maintain up-to-date backups and incident response plans to quickly address any potential breaches stemming from this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-03-12T17:54:45.710Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb9c2
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/18/2025, 9:05:41 PM
Last updated: 8/3/2025, 12:37:26 AM
Views: 11
Related Threats
CVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.