Skip to main content

CVE-2025-33073: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-33073cvecve-2025-33073cwe-284
Published: Tue Jun 10 2025 (06/10/2025, 17:02:35 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 09/16/2025, 00:32:13 UTC

Technical Analysis

CVE-2025-33073 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves improper access control within the Server Message Block (SMB) protocol implementation. The vulnerability is categorized under CWE-284, which concerns improper access control mechanisms. Specifically, this flaw allows an attacker who is already authorized on the network to elevate their privileges remotely without requiring user interaction. The vulnerability has a CVSS v3.1 base score of 8.8, indicating a high level of severity. The CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C) reveals that the attack can be performed over the network with low attack complexity, requires the attacker to have some privileges (PR:L), but no user interaction is needed. The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The exploitability is considered probable (E:P), and the remediation level is official (RL:O) with confirmed fix (RC:C), although no patch links are currently provided. This vulnerability could allow an attacker to gain elevated privileges on a target system by exploiting weaknesses in SMB access controls, potentially leading to full system compromise or lateral movement within a network. No known exploits are currently reported in the wild, but the presence of such a critical vulnerability in a widely deployed OS version makes it a significant risk if weaponized.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for enterprises and public sector entities that continue to operate legacy systems running Windows 10 Version 1809. The SMB protocol is commonly used for file sharing and network communications, making this vulnerability a potential vector for lateral movement and privilege escalation within corporate networks. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical services, and potential deployment of ransomware or other malware. Given the high impact on confidentiality, integrity, and availability, organizations could face data breaches, operational downtime, and reputational damage. The fact that the attack requires only low privileges but no user interaction increases the likelihood of exploitation in internal threat scenarios or by attackers who have gained initial footholds. European organizations with complex network environments and legacy infrastructure are particularly vulnerable, and the lack of a publicly available patch at the time of disclosure increases the urgency for mitigation.

Mitigation Recommendations

1. Immediate mitigation should focus on network segmentation to limit SMB traffic exposure, especially isolating legacy Windows 10 Version 1809 systems from critical network segments. 2. Disable SMBv1 and restrict SMBv2/3 access to trusted hosts only, using firewall rules and network access controls. 3. Employ strict access control policies and monitor SMB traffic for anomalous behavior indicative of privilege escalation attempts. 4. Apply any available security updates or patches from Microsoft as soon as they are released; monitor official Microsoft channels for patch announcements related to CVE-2025-33073. 5. Use endpoint detection and response (EDR) tools to detect suspicious activities related to SMB exploitation and privilege escalation. 6. Conduct regular vulnerability assessments and penetration testing focusing on SMB services and access controls. 7. Educate IT staff about the risks of legacy OS versions and plan for upgrading or decommissioning Windows 10 Version 1809 systems to supported versions with ongoing security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.203Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f511b0bd07c39389c2c

Added to database: 6/10/2025, 6:54:09 PM

Last enriched: 9/16/2025, 12:32:13 AM

Last updated: 9/26/2025, 4:14:16 PM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats