CVE-2025-33056: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507
Improper access control in Microsoft Local Security Authority Server (lsasrv) allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-33056 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) involving improper access control in the Local Security Authority Server (lsasrv) component. The flaw is classified under CWE-284, indicating that the system fails to properly restrict access to critical functionality. Specifically, this vulnerability allows an unauthenticated attacker to remotely trigger a denial of service condition by exploiting the lsasrv service over the network. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it straightforward to exploit. The vulnerability impacts availability (A:H) but does not affect confidentiality or integrity. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component on the targeted system. The CVSS v3.1 base score is 7.5, reflecting a high severity due to ease of exploitation and potential service disruption. No known exploits have been observed in the wild yet, and no patches have been officially released at the time of publication. The vulnerability was reserved in April 2025 and published in June 2025. Given the age of Windows 10 Version 1507, which is an early release of Windows 10, many organizations may have already upgraded, but legacy systems remain at risk. The lsasrv service is critical for local security authority functions, so its disruption can cause system instability or denial of access to security services, impacting system availability and operational continuity.
Potential Impact
The primary impact of CVE-2025-33056 is denial of service against Windows 10 Version 1507 systems by crashing or destabilizing the Local Security Authority Server service. This can lead to system instability, loss of access to security services, and potential interruption of business-critical operations. Since the vulnerability requires no authentication and no user interaction, attackers can remotely target vulnerable systems en masse, potentially causing widespread outages in environments with many legacy Windows 10 endpoints. Although confidentiality and integrity are not compromised, the availability impact can be severe, especially in enterprise, government, and critical infrastructure environments relying on this outdated OS version. The lack of patches increases the risk until mitigations or upgrades are applied. Organizations with legacy Windows 10 deployments face operational risks, including disruption of authentication services and potential cascading failures in dependent systems. The vulnerability could be leveraged as part of a larger attack chain to degrade network reliability or distract defenders.
Mitigation Recommendations
Since no official patches are currently available, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched Windows version to eliminate exposure. In the interim, network-level mitigations such as restricting inbound access to the lsasrv service ports through firewalls or network segmentation can reduce exposure. Monitoring network traffic for unusual or malformed packets targeting lsasrv may help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures can provide additional protection. Administrators should audit their environment to identify any remaining systems running this legacy OS version and plan for rapid remediation. Applying strict access control policies and limiting exposure of vulnerable systems to untrusted networks will reduce risk. Regularly checking Microsoft security advisories for patches or workarounds is essential. Finally, implementing robust incident response plans to quickly address potential denial of service incidents will help minimize operational impact.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Japan, South Korea, Brazil, Russia, Canada, Australia
CVE-2025-33056: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507
Description
Improper access control in Microsoft Local Security Authority Server (lsasrv) allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-33056 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) involving improper access control in the Local Security Authority Server (lsasrv) component. The flaw is classified under CWE-284, indicating that the system fails to properly restrict access to critical functionality. Specifically, this vulnerability allows an unauthenticated attacker to remotely trigger a denial of service condition by exploiting the lsasrv service over the network. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it straightforward to exploit. The vulnerability impacts availability (A:H) but does not affect confidentiality or integrity. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component on the targeted system. The CVSS v3.1 base score is 7.5, reflecting a high severity due to ease of exploitation and potential service disruption. No known exploits have been observed in the wild yet, and no patches have been officially released at the time of publication. The vulnerability was reserved in April 2025 and published in June 2025. Given the age of Windows 10 Version 1507, which is an early release of Windows 10, many organizations may have already upgraded, but legacy systems remain at risk. The lsasrv service is critical for local security authority functions, so its disruption can cause system instability or denial of access to security services, impacting system availability and operational continuity.
Potential Impact
The primary impact of CVE-2025-33056 is denial of service against Windows 10 Version 1507 systems by crashing or destabilizing the Local Security Authority Server service. This can lead to system instability, loss of access to security services, and potential interruption of business-critical operations. Since the vulnerability requires no authentication and no user interaction, attackers can remotely target vulnerable systems en masse, potentially causing widespread outages in environments with many legacy Windows 10 endpoints. Although confidentiality and integrity are not compromised, the availability impact can be severe, especially in enterprise, government, and critical infrastructure environments relying on this outdated OS version. The lack of patches increases the risk until mitigations or upgrades are applied. Organizations with legacy Windows 10 deployments face operational risks, including disruption of authentication services and potential cascading failures in dependent systems. The vulnerability could be leveraged as part of a larger attack chain to degrade network reliability or distract defenders.
Mitigation Recommendations
Since no official patches are currently available, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched Windows version to eliminate exposure. In the interim, network-level mitigations such as restricting inbound access to the lsasrv service ports through firewalls or network segmentation can reduce exposure. Monitoring network traffic for unusual or malformed packets targeting lsasrv may help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures can provide additional protection. Administrators should audit their environment to identify any remaining systems running this legacy OS version and plan for rapid remediation. Applying strict access control policies and limiting exposure of vulnerable systems to untrusted networks will reduce risk. Regularly checking Microsoft security advisories for patches or workarounds is essential. Finally, implementing robust incident response plans to quickly address potential denial of service incidents will help minimize operational impact.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-04-15T17:46:28.198Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f511b0bd07c39389b59
Added to database: 6/10/2025, 6:54:09 PM
Last enriched: 2/21/2026, 9:03:24 PM
Last updated: 3/25/2026, 1:45:52 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.