Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33073: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-33073cvecve-2025-33073cwe-284
Published: Tue Jun 10 2025 (06/10/2025, 17:02:35 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 10/25/2025, 05:31:49 UTC

Technical Analysis

CVE-2025-33073 is a vulnerability classified under CWE-284 (Improper Access Control) found in Microsoft Windows 10 Version 1809, specifically affecting the Server Message Block (SMB) protocol implementation. The flaw allows an attacker who is already authorized on the network with limited privileges to exploit improper access control mechanisms in SMB to elevate their privileges. This means an attacker can gain higher-level permissions than intended, potentially leading to full system compromise. The vulnerability requires network access but does not require user interaction, making it exploitable remotely by an authenticated attacker. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be leveraged in targeted attacks or lateral movement within compromised networks. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, a version still in use in many enterprise environments. The lack of currently available patches increases the urgency for organizations to implement interim mitigations and prepare for patch deployment once released. This vulnerability highlights the critical importance of securing SMB services and controlling network access to prevent privilege escalation attacks.

Potential Impact

For European organizations, the impact of CVE-2025-33073 can be significant. Successful exploitation allows attackers to escalate privileges over the network, potentially gaining administrative control over affected systems. This can lead to unauthorized access to sensitive data, disruption of business operations, and the deployment of further malware or ransomware. Organizations relying on Windows 10 Version 1809, particularly those with extensive SMB usage such as file servers, domain controllers, and networked workstations, face increased risk. The vulnerability could facilitate lateral movement within corporate networks, amplifying the damage from initial breaches. Critical infrastructure, government agencies, and large enterprises in Europe are especially vulnerable due to their reliance on legacy Windows versions and complex network environments. The absence of known exploits in the wild currently provides a window for proactive defense, but the potential for rapid weaponization remains high given the vulnerability's characteristics.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches for Windows 10 Version 1809 as soon as they become available. 2. Until patches are released, restrict SMB protocol access to trusted hosts only by implementing strict firewall rules and network segmentation. 3. Disable SMBv1 and enforce SMB signing and encryption where possible to reduce attack surface. 4. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous SMB traffic indicative of exploitation attempts. 5. Enforce the principle of least privilege for all user accounts and service accounts to limit the impact of any privilege escalation. 6. Conduct regular vulnerability scans and penetration tests focusing on SMB services and privilege escalation vectors. 7. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving SMB privilege escalation. 8. Consider upgrading affected systems to a supported Windows version if feasible, as Windows 10 Version 1809 is an older release with limited support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.203Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f511b0bd07c39389c2c

Added to database: 6/10/2025, 6:54:09 PM

Last enriched: 10/25/2025, 5:31:49 AM

Last updated: 11/20/2025, 9:00:23 PM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats