CVE-2025-47996: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1507
Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-47996 is an integer underflow vulnerability classified under CWE-191 found in the Windows MBT Transport driver component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). An integer underflow occurs when an arithmetic operation causes a value to wrap around below its minimum representable value, potentially leading to unexpected behavior such as buffer overflows or memory corruption. In this case, the underflow in the MBT Transport driver can be triggered by an authorized local attacker, allowing them to escalate privileges on the affected system. The vulnerability does not require user interaction and can be exploited with low attack complexity, given the attacker already has some level of local access (PR:L). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability (all rated high), with low attack complexity and no user interaction required. The vulnerability affects only the initial release version of Windows 10 (1507), which is largely superseded by newer versions but may still be in use in legacy or specialized environments. No public exploits or patches have been reported at the time of publication, but the vulnerability's characteristics suggest it could be leveraged for full system compromise if exploited. The MBT Transport driver is a kernel-mode component, so exploitation could allow attackers to execute arbitrary code with elevated privileges, bypassing security controls and potentially installing persistent malware or disrupting system operations.
Potential Impact
The impact of CVE-2025-47996 is significant for organizations running Windows 10 Version 1507. Successful exploitation allows an attacker with local authorized access to escalate privileges to SYSTEM or kernel level, compromising the entire system's confidentiality, integrity, and availability. This could lead to unauthorized access to sensitive data, installation of persistent malware, disruption of critical services, and lateral movement within networks. Although the affected version is an early Windows 10 release, some legacy systems in industrial, governmental, or specialized environments may still run it, exposing them to risk. The lack of required user interaction and low attack complexity increase the likelihood of exploitation in environments where local access controls are weak or compromised. Organizations relying on this version may face compliance issues and increased risk of targeted attacks, especially in sectors with high security requirements.
Mitigation Recommendations
To mitigate CVE-2025-47996, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later. Since no patches are currently available, migration is the most effective mitigation. Restrict local access to trusted users only, enforce least privilege principles, and implement strong endpoint protection to detect and prevent privilege escalation attempts. Employ application whitelisting and kernel integrity monitoring to detect anomalous behavior related to the MBT Transport driver. Regularly audit and monitor system logs for signs of exploitation attempts. Network segmentation can limit the impact of compromised endpoints. For environments where upgrade is not immediately feasible, consider disabling or restricting the MBT Transport driver if possible, though this may impact functionality and should be tested carefully. Maintain up-to-date backups and incident response plans to recover quickly from potential compromises.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Japan, Brazil, Russia, South Korea, Canada, Australia
CVE-2025-47996: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1507
Description
Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47996 is an integer underflow vulnerability classified under CWE-191 found in the Windows MBT Transport driver component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). An integer underflow occurs when an arithmetic operation causes a value to wrap around below its minimum representable value, potentially leading to unexpected behavior such as buffer overflows or memory corruption. In this case, the underflow in the MBT Transport driver can be triggered by an authorized local attacker, allowing them to escalate privileges on the affected system. The vulnerability does not require user interaction and can be exploited with low attack complexity, given the attacker already has some level of local access (PR:L). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability (all rated high), with low attack complexity and no user interaction required. The vulnerability affects only the initial release version of Windows 10 (1507), which is largely superseded by newer versions but may still be in use in legacy or specialized environments. No public exploits or patches have been reported at the time of publication, but the vulnerability's characteristics suggest it could be leveraged for full system compromise if exploited. The MBT Transport driver is a kernel-mode component, so exploitation could allow attackers to execute arbitrary code with elevated privileges, bypassing security controls and potentially installing persistent malware or disrupting system operations.
Potential Impact
The impact of CVE-2025-47996 is significant for organizations running Windows 10 Version 1507. Successful exploitation allows an attacker with local authorized access to escalate privileges to SYSTEM or kernel level, compromising the entire system's confidentiality, integrity, and availability. This could lead to unauthorized access to sensitive data, installation of persistent malware, disruption of critical services, and lateral movement within networks. Although the affected version is an early Windows 10 release, some legacy systems in industrial, governmental, or specialized environments may still run it, exposing them to risk. The lack of required user interaction and low attack complexity increase the likelihood of exploitation in environments where local access controls are weak or compromised. Organizations relying on this version may face compliance issues and increased risk of targeted attacks, especially in sectors with high security requirements.
Mitigation Recommendations
To mitigate CVE-2025-47996, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later. Since no patches are currently available, migration is the most effective mitigation. Restrict local access to trusted users only, enforce least privilege principles, and implement strong endpoint protection to detect and prevent privilege escalation attempts. Employ application whitelisting and kernel integrity monitoring to detect anomalous behavior related to the MBT Transport driver. Regularly audit and monitor system logs for signs of exploitation attempts. Network segmentation can limit the impact of compromised endpoints. For environments where upgrade is not immediately feasible, consider disabling or restricting the MBT Transport driver if possible, though this may impact functionality and should be tested carefully. Maintain up-to-date backups and incident response plans to recover quickly from potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-05-14T14:44:20.085Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686d50d46f40f0eb72f91b39
Added to database: 7/8/2025, 5:09:40 PM
Last enriched: 2/26/2026, 9:41:17 PM
Last updated: 3/25/2026, 4:13:40 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.