Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29974: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-29974cvecve-2025-29974cwe-191cwe-125
Published: Tue May 13 2025 (05/13/2025, 16:59:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:43:42 UTC

Technical Analysis

CVE-2025-29974 is a medium-severity integer underflow vulnerability identified in the Windows Kernel component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability stems from a CWE-191 integer underflow condition, where an arithmetic operation causes a value to wrap around below its minimum representable value, leading to unexpected behavior in kernel memory handling. This flaw can be exploited by an unauthorized attacker over an adjacent network segment, meaning the attacker must be on the same local network or a logically adjacent network to the target system. The attack vector is network-based (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R), such as tricking a user into connecting to a malicious network or interacting with a crafted network packet. The scope is unchanged (S:U), and the primary impact is on confidentiality (C:H), allowing information disclosure. There is no impact on integrity or availability. The vulnerability could allow attackers to extract sensitive kernel memory information, potentially aiding further attacks or reconnaissance. No known exploits have been reported in the wild, and no official patches have been linked yet, though the vulnerability was published on May 13, 2025. Given the affected product is an early release of Windows 10 (Version 1507), which is largely out of support, many systems may remain unpatched, increasing risk. The vulnerability highlights the importance of maintaining updated operating systems and network segmentation to reduce exposure.

Potential Impact

For European organizations, the primary impact of CVE-2025-29974 is unauthorized disclosure of sensitive information from affected Windows 10 Version 1507 systems. This could lead to leakage of confidential data, intellectual property, or internal system details that attackers could leverage for further exploitation or lateral movement. Sectors with high reliance on legacy Windows 10 systems, such as manufacturing, healthcare, or government agencies, may face increased risk. The requirement for network adjacency means that attackers must have some level of network access, which could be facilitated by compromised internal devices or malicious insiders. The confidentiality breach could undermine compliance with GDPR and other data protection regulations, potentially resulting in legal and financial consequences. Since the vulnerability does not affect system integrity or availability, direct disruption or data manipulation is unlikely. However, information disclosure can be a critical first step in multi-stage attacks targeting European critical infrastructure or enterprises. The lack of patches and known exploits suggests a window of exposure, especially for organizations slow to upgrade or segment their networks.

Mitigation Recommendations

1. Upgrade all affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version to eliminate the vulnerability. 2. Implement strict network segmentation to limit adjacency exposure, ensuring that untrusted devices or networks cannot directly communicate with critical Windows 10 systems. 3. Employ network monitoring and intrusion detection systems to identify anomalous traffic patterns indicative of exploitation attempts targeting kernel vulnerabilities. 4. Educate users about the risks of connecting to untrusted networks or interacting with suspicious network prompts to reduce user interaction exploitation vectors. 5. Apply host-based security controls such as endpoint detection and response (EDR) solutions capable of detecting kernel-level anomalies. 6. Regularly audit and inventory legacy systems to prioritize remediation or isolation of vulnerable endpoints. 7. Follow Microsoft security advisories closely for patches or workarounds once released and apply them promptly. 8. Restrict administrative privileges and enforce the principle of least privilege to reduce potential attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-12T17:54:45.710Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb9c2

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:43:42 AM

Last updated: 5/8/2026, 7:25:04 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses