Skip to main content

CVE-2025-33056: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-33056cvecve-2025-33056cwe-284
Published: Tue Jun 10 2025 (06/10/2025, 17:02:33 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Microsoft Local Security Authority Server (lsasrv) allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 07/10/2025, 21:35:02 UTC

Technical Analysis

CVE-2025-33056 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Microsoft Local Security Authority Server (LSASS) component, specifically related to improper access control (CWE-284). LSASS is a critical system process responsible for enforcing security policies, handling authentication, and managing user logins. The vulnerability allows an unauthorized attacker to remotely cause a denial of service (DoS) condition over the network without requiring any privileges or user interaction. The CVSS v3.1 score is 7.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. The vulnerability is exploitable remotely, making it a significant threat for systems exposed to untrusted networks. Although no known exploits are currently reported in the wild, the potential for disruption is considerable given LSASS's central role in system security and authentication. No patches or mitigations are currently linked, indicating that affected organizations must prioritize monitoring and risk reduction strategies until official fixes are released.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to operational continuity, particularly for enterprises and public sector entities relying on Windows 10 Version 1809 in networked environments. Exploitation could lead to denial of service attacks that disrupt authentication services, potentially locking users out of critical systems and halting business processes. This could affect sectors such as finance, healthcare, government, and critical infrastructure, where availability of authentication services is paramount. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation in exposed network segments. Given the widespread use of Windows 10 in Europe, especially in corporate and governmental environments, the vulnerability could facilitate targeted disruption campaigns or opportunistic attacks, impacting service delivery and potentially causing cascading effects in interconnected systems.

Mitigation Recommendations

Organizations should immediately identify and isolate systems running Windows 10 Version 1809 (build 17763.0) within their networks. Network segmentation should be enforced to limit exposure of LSASS services to untrusted networks, including strict firewall rules blocking unnecessary inbound traffic to LSASS-related ports. Employ network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous LSASS traffic patterns. Implement strict access control policies and monitor authentication logs for unusual activity indicative of attempted exploitation. Until patches are available, consider upgrading affected systems to a supported and patched Windows version. Additionally, deploy endpoint detection and response (EDR) solutions capable of detecting abnormal process behavior related to LSASS. Regularly review and update incident response plans to include scenarios involving denial of service attacks targeting authentication services. Engage with Microsoft security advisories for timely updates and patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f511b0bd07c39389b59

Added to database: 6/10/2025, 6:54:09 PM

Last enriched: 7/10/2025, 9:35:02 PM

Last updated: 8/5/2025, 2:30:42 PM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats