Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47996: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-47996cvecve-2025-47996cwe-191cwe-125
Published: Tue Jul 08 2025 (07/08/2025, 16:57:32 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:41:17 UTC

Technical Analysis

CVE-2025-47996 is an integer underflow vulnerability classified under CWE-191 found in the Windows MBT Transport driver component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). An integer underflow occurs when an arithmetic operation causes a value to wrap around below its minimum representable value, potentially leading to unexpected behavior such as buffer overflows or memory corruption. In this case, the underflow in the MBT Transport driver can be triggered by an authorized local attacker, allowing them to escalate privileges on the affected system. The vulnerability does not require user interaction and can be exploited with low attack complexity, given the attacker already has some level of local access (PR:L). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability (all rated high), with low attack complexity and no user interaction required. The vulnerability affects only the initial release version of Windows 10 (1507), which is largely superseded by newer versions but may still be in use in legacy or specialized environments. No public exploits or patches have been reported at the time of publication, but the vulnerability's characteristics suggest it could be leveraged for full system compromise if exploited. The MBT Transport driver is a kernel-mode component, so exploitation could allow attackers to execute arbitrary code with elevated privileges, bypassing security controls and potentially installing persistent malware or disrupting system operations.

Potential Impact

The impact of CVE-2025-47996 is significant for organizations running Windows 10 Version 1507. Successful exploitation allows an attacker with local authorized access to escalate privileges to SYSTEM or kernel level, compromising the entire system's confidentiality, integrity, and availability. This could lead to unauthorized access to sensitive data, installation of persistent malware, disruption of critical services, and lateral movement within networks. Although the affected version is an early Windows 10 release, some legacy systems in industrial, governmental, or specialized environments may still run it, exposing them to risk. The lack of required user interaction and low attack complexity increase the likelihood of exploitation in environments where local access controls are weak or compromised. Organizations relying on this version may face compliance issues and increased risk of targeted attacks, especially in sectors with high security requirements.

Mitigation Recommendations

To mitigate CVE-2025-47996, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later. Since no patches are currently available, migration is the most effective mitigation. Restrict local access to trusted users only, enforce least privilege principles, and implement strong endpoint protection to detect and prevent privilege escalation attempts. Employ application whitelisting and kernel integrity monitoring to detect anomalous behavior related to the MBT Transport driver. Regularly audit and monitor system logs for signs of exploitation attempts. Network segmentation can limit the impact of compromised endpoints. For environments where upgrade is not immediately feasible, consider disabling or restricting the MBT Transport driver if possible, though this may impact functionality and should be tested carefully. Maintain up-to-date backups and incident response plans to recover quickly from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:44:20.085Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d46f40f0eb72f91b39

Added to database: 7/8/2025, 5:09:40 PM

Last enriched: 2/26/2026, 9:41:17 PM

Last updated: 3/25/2026, 4:13:40 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses