Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33056: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-33056cvecve-2025-33056cwe-284
Published: Tue Jun 10 2025 (06/10/2025, 17:02:33 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper access control in Microsoft Local Security Authority Server (lsasrv) allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:03:24 UTC

Technical Analysis

CVE-2025-33056 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) involving improper access control in the Local Security Authority Server (lsasrv) component. The flaw is classified under CWE-284, indicating that the system fails to properly restrict access to critical functionality. Specifically, this vulnerability allows an unauthenticated attacker to remotely trigger a denial of service condition by exploiting the lsasrv service over the network. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it straightforward to exploit. The vulnerability impacts availability (A:H) but does not affect confidentiality or integrity. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component on the targeted system. The CVSS v3.1 base score is 7.5, reflecting a high severity due to ease of exploitation and potential service disruption. No known exploits have been observed in the wild yet, and no patches have been officially released at the time of publication. The vulnerability was reserved in April 2025 and published in June 2025. Given the age of Windows 10 Version 1507, which is an early release of Windows 10, many organizations may have already upgraded, but legacy systems remain at risk. The lsasrv service is critical for local security authority functions, so its disruption can cause system instability or denial of access to security services, impacting system availability and operational continuity.

Potential Impact

The primary impact of CVE-2025-33056 is denial of service against Windows 10 Version 1507 systems by crashing or destabilizing the Local Security Authority Server service. This can lead to system instability, loss of access to security services, and potential interruption of business-critical operations. Since the vulnerability requires no authentication and no user interaction, attackers can remotely target vulnerable systems en masse, potentially causing widespread outages in environments with many legacy Windows 10 endpoints. Although confidentiality and integrity are not compromised, the availability impact can be severe, especially in enterprise, government, and critical infrastructure environments relying on this outdated OS version. The lack of patches increases the risk until mitigations or upgrades are applied. Organizations with legacy Windows 10 deployments face operational risks, including disruption of authentication services and potential cascading failures in dependent systems. The vulnerability could be leveraged as part of a larger attack chain to degrade network reliability or distract defenders.

Mitigation Recommendations

Since no official patches are currently available, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched Windows version to eliminate exposure. In the interim, network-level mitigations such as restricting inbound access to the lsasrv service ports through firewalls or network segmentation can reduce exposure. Monitoring network traffic for unusual or malformed packets targeting lsasrv may help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures can provide additional protection. Administrators should audit their environment to identify any remaining systems running this legacy OS version and plan for rapid remediation. Applying strict access control policies and limiting exposure of vulnerable systems to untrusted networks will reduce risk. Regularly checking Microsoft security advisories for patches or workarounds is essential. Finally, implementing robust incident response plans to quickly address potential denial of service incidents will help minimize operational impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f511b0bd07c39389b59

Added to database: 6/10/2025, 6:54:09 PM

Last enriched: 2/21/2026, 9:03:24 PM

Last updated: 3/25/2026, 1:45:52 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses