Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47973: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-47973cvecve-2025-47973cwe-126
Published: Tue Jul 08 2025 (07/08/2025, 16:57:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:06:06 UTC

Technical Analysis

CVE-2025-47973 is a buffer over-read vulnerability classified under CWE-126, affecting the Virtual Hard Disk (VHDX) functionality in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability arises from improper bounds checking when processing VHDX files, which can lead to reading memory beyond the intended buffer. This flaw can be exploited by a local attacker who does not have privileges but requires user interaction, such as convincing a user to open or mount a maliciously crafted VHDX file. Successful exploitation results in elevation of privileges, granting the attacker higher system rights, potentially SYSTEM-level access. The CVSS v3.1 base score is 7.8, indicating a high severity with high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:R). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting this is a recently disclosed vulnerability. The vulnerability affects only the initial release of Windows 10, which may limit the affected population but still poses a risk to legacy systems. The vulnerability could be leveraged to bypass security controls, execute arbitrary code with elevated privileges, and compromise system integrity and confidentiality.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to legacy systems still running Windows 10 Version 1507, which may be found in industrial control systems, government agencies, or enterprises with delayed upgrade cycles. Exploitation could lead to unauthorized privilege escalation, enabling attackers to execute arbitrary code, access sensitive data, or disrupt critical services. This could result in data breaches, operational downtime, and loss of trust. The impact is especially critical for sectors with stringent data protection requirements such as finance, healthcare, and public administration. Additionally, the requirement for user interaction means phishing or social engineering could be used to trigger exploitation, increasing the attack surface. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention. Organizations relying on virtualization or VHDX files for backup, testing, or deployment should be particularly vigilant.

Mitigation Recommendations

1. Immediately identify and inventory all systems running Windows 10 Version 1507 within the organization. 2. Prioritize upgrading these systems to a supported and patched version of Windows 10 or later, as this version is outdated and unsupported. 3. Until upgrades are complete, restrict user permissions to prevent unauthorized mounting or opening of VHDX files. 4. Implement strict access controls and monitoring on directories and shares where VHDX files are stored to detect and prevent unauthorized modifications or usage. 5. Educate users about the risks of opening untrusted VHDX files and implement policies to limit user interaction with unknown virtual disk files. 6. Monitor local system logs and security events for unusual activity related to VHDX handling or privilege escalation attempts. 7. Apply any interim security advisories or workarounds released by Microsoft as they become available. 8. Employ endpoint detection and response (EDR) tools capable of detecting suspicious local privilege escalation behaviors. 9. Review and harden virtualization and backup processes that utilize VHDX files to minimize exposure. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d36f40f0eb72f91af8

Added to database: 7/8/2025, 5:09:39 PM

Last enriched: 2/14/2026, 10:06:06 AM

Last updated: 3/24/2026, 7:33:23 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses