Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47987: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-47987cvecve-2025-47987cwe-122cwe-190
Published: Tue Jul 08 2025 (07/08/2025, 16:57:06 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:08:22 UTC

Technical Analysis

CVE-2025-47987 is a heap-based buffer overflow vulnerability identified in the Windows Credential Security Support Provider (Cred SSP) Protocol on Windows 10 Version 1507 (build 10.0.10240.0). This vulnerability arises from improper handling of memory buffers within the Cred SSP component, which is responsible for managing authentication credentials and security tokens. An authorized attacker with local access can exploit this flaw to overwrite heap memory, potentially leading to arbitrary code execution with elevated privileges. The vulnerability does not require user interaction and has a low attack complexity, meaning an attacker with standard local privileges can trigger the overflow to escalate their rights to SYSTEM level. The CVSS v3.1 base score of 7.8 reflects high impact on confidentiality, integrity, and availability, as successful exploitation could allow full control over the affected system. The vulnerability is currently published but lacks an official patch or known exploits in the wild. Given that Windows 10 Version 1507 is an early release version, many modern systems have likely been upgraded, but legacy or isolated environments may still be vulnerable. The absence of patch links indicates that mitigation relies on system upgrades or workarounds until Microsoft releases a fix.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to legacy systems still running Windows 10 Version 1507, which may be found in industrial control systems, embedded devices, or isolated environments where upgrades are delayed. Exploitation could lead to local privilege escalation, allowing attackers to gain SYSTEM-level access, bypass security controls, and potentially move laterally within networks. This could compromise sensitive data confidentiality, disrupt system availability, and undermine integrity of critical infrastructure. The impact is heightened in sectors with strict regulatory requirements such as finance, healthcare, and government, where unauthorized access could lead to severe compliance violations and operational disruptions. Since the vulnerability requires local access, insider threats or attackers who gain initial footholds via other means could leverage this flaw to deepen their control. The lack of patches increases the window of exposure, emphasizing the need for proactive mitigation. Organizations relying on legacy Windows 10 installations in Europe must prioritize risk assessment and containment to prevent exploitation.

Mitigation Recommendations

1. Immediate upgrade of all systems running Windows 10 Version 1507 to a supported and patched Windows version is the most effective mitigation. 2. Restrict local access to affected systems by enforcing strict access controls, including limiting administrative privileges and using network segmentation to isolate legacy devices. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 4. Monitor local authentication logs and security events for unusual privilege escalation activities. 5. If upgrading is not immediately feasible, consider disabling or restricting the use of Cred SSP where possible, or applying group policy settings to limit its exposure. 6. Conduct regular vulnerability assessments and penetration testing focused on legacy systems to identify and remediate potential attack vectors. 7. Educate internal staff about the risks of local privilege escalation vulnerabilities and enforce strong physical security controls to prevent unauthorized local access. 8. Stay informed on Microsoft advisories for any forthcoming patches or workarounds related to this CVE.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:44:20.084Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d36f40f0eb72f91b20

Added to database: 7/8/2025, 5:09:39 PM

Last enriched: 2/14/2026, 10:08:22 AM

Last updated: 3/24/2026, 9:57:50 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses