Skip to main content

CVE-2025-33058: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-33058cvecve-2025-33058cwe-125
Published: Tue Jun 10 2025 (06/10/2025, 17:02:16 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 07/10/2025, 23:01:57 UTC

Technical Analysis

CVE-2025-33058 is a medium-severity vulnerability identified as an out-of-bounds read (CWE-125) in the Windows Storage Management Provider component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an authorized local attacker to read memory beyond the intended buffer boundaries, potentially disclosing sensitive information. The flaw arises from improper bounds checking in the storage management code, which can be exploited by a user with limited privileges (PR:L) without requiring user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have local access to the system. The vulnerability does not impact integrity or availability but has a high impact on confidentiality (C:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS v3.1 base score is 5.5, reflecting a medium severity level. The vulnerability is significant because it could allow attackers to access sensitive data stored in memory, potentially leading to information disclosure that could be leveraged for further attacks or privilege escalation. However, exploitation requires local access and some level of authorization, limiting the attack surface primarily to insiders or compromised accounts.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where Windows 10 Version 1809 is still in use, especially in sectors with sensitive data such as finance, healthcare, and government. Unauthorized disclosure of sensitive information could lead to data breaches, regulatory non-compliance (e.g., GDPR), and loss of customer trust. Since the vulnerability requires local access and authorized privileges, the threat is heightened in scenarios where endpoint security is weak, or insider threats are a concern. Organizations with legacy systems or delayed patching cycles are more vulnerable. The impact is less severe for organizations that have upgraded to newer Windows versions or have robust access controls and endpoint detection and response (EDR) solutions in place. However, given the high confidentiality impact, even limited data leakage could have serious consequences depending on the nature of the disclosed information.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 systems from version 1809 to a supported and updated version of Windows 10 or later, as Microsoft typically discontinues support for older versions, increasing risk exposure. 2. Implement strict local access controls and limit the number of users with authorized privileges on affected systems to reduce the attack surface. 3. Employ endpoint security solutions that monitor for anomalous local activity and potential exploitation attempts targeting storage management components. 4. Conduct regular audits of systems running Windows 10 Version 1809 to identify and remediate unauthorized access or privilege escalations. 5. Use application whitelisting and least privilege principles to restrict execution of unauthorized code that could exploit this vulnerability. 6. Monitor vendor advisories closely for the release of official patches or mitigations and apply them promptly once available. 7. Educate users about the risks of local privilege misuse and enforce policies to prevent unauthorized physical or remote local access to critical systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.199Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f511b0bd07c39389b9b

Added to database: 6/10/2025, 6:54:09 PM

Last enriched: 7/10/2025, 11:01:57 PM

Last updated: 8/15/2025, 3:00:51 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats