Skip to main content

CVE-2025-33065: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-33065cvecve-2025-33065cwe-125
Published: Tue Jun 10 2025 (06/10/2025, 17:02:20 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 07/10/2025, 23:03:47 UTC

Technical Analysis

CVE-2025-33065 is a medium-severity vulnerability identified as an out-of-bounds read (CWE-125) in the Windows Storage Management Provider component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an authorized local attacker to read memory outside the intended buffer boundaries, potentially disclosing sensitive information. The flaw arises from improper bounds checking during memory operations within the storage management provider, which is responsible for handling storage-related tasks in the OS. Exploitation requires local privileges (PR:L) but no user interaction (UI:N), and the attack complexity is low (AC:L). The vulnerability does not affect system integrity or availability but has a high impact on confidentiality (C:H), meaning sensitive data could be leaked. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component without impacting other system components. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS v3.1 base score is 5.5, reflecting a medium severity level. This vulnerability is specific to Windows 10 Version 1809, which is an older release but may still be in use in some environments. Given the local privilege requirement, attackers must have some level of access to the system to exploit this issue, which limits remote exploitation but still poses a risk if local accounts are compromised or if malicious insiders exist.

Potential Impact

For European organizations, the primary impact of CVE-2025-33065 is the potential unauthorized disclosure of sensitive information stored in memory by the Windows Storage Management Provider. This could include data related to storage configurations, metadata, or other sensitive system information. Organizations relying on Windows 10 Version 1809, particularly in sectors with strict data protection regulations such as finance, healthcare, and government, may face compliance risks if sensitive data is leaked. Although the vulnerability does not allow privilege escalation or system disruption, the confidentiality breach could facilitate further attacks or data exfiltration. The requirement for local access reduces the risk of widespread exploitation but highlights the importance of internal security controls, endpoint protection, and monitoring for suspicious local activities. Legacy systems or those with delayed patching cycles are particularly vulnerable. Additionally, organizations with shared workstations or environments where multiple users have local access may be at increased risk.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1809 is out of mainstream support and may not receive security updates. 2. Implement strict access controls to limit local user privileges and prevent unauthorized local access. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual local activities that could indicate exploitation attempts. 4. Conduct regular audits of user accounts and remove or disable unnecessary local accounts to reduce the attack surface. 5. Use application whitelisting and privilege management to restrict execution of unauthorized code locally. 6. Where upgrading is not immediately possible, isolate legacy systems from sensitive networks and data to minimize potential impact. 7. Educate users about the risks of local privilege misuse and enforce strong authentication mechanisms to prevent unauthorized access. 8. Monitor vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.200Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f511b0bd07c39389bb2

Added to database: 6/10/2025, 6:54:09 PM

Last enriched: 7/10/2025, 11:03:47 PM

Last updated: 8/14/2025, 8:51:12 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats