Skip to main content

CVE-2025-48804: CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-48804cvecve-2025-48804cwe-349
Published: Tue Jul 08 2025 (07/08/2025, 16:57:38 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

AI-Powered Analysis

AILast updated: 08/07/2025, 00:51:21 UTC

Technical Analysis

CVE-2025-48804 is a vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the BitLocker encryption feature. The weakness is classified under CWE-349, which involves the acceptance of extraneous untrusted data alongside trusted data. In this context, BitLocker improperly processes or accepts additional untrusted input data when handling trusted data, which can be exploited by an attacker with physical access to the device. This flaw allows an unauthorized attacker to bypass BitLocker's security protections, potentially gaining access to encrypted volumes without proper authorization. The vulnerability does not require user interaction or prior authentication, but it does require physical access to the affected system. The CVSS v3.1 base score is 6.8, indicating a medium severity level, with a vector string of AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack vector is physical, attack complexity is low, no privileges or user interaction are required, and the impact on confidentiality, integrity, and availability is high. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on July 8, 2025, and reserved on May 26, 2025. This issue poses a significant risk to the confidentiality and integrity of data protected by BitLocker on Windows 10 Version 1809 systems, especially in environments where physical device security cannot be guaranteed.

Potential Impact

For European organizations, this vulnerability presents a critical risk to data confidentiality and integrity, particularly for sectors handling sensitive or regulated information such as finance, healthcare, government, and critical infrastructure. Since BitLocker is widely used in enterprise environments across Europe for disk encryption, exploitation of this vulnerability could lead to unauthorized data disclosure or manipulation if an attacker gains physical access to devices. The impact is exacerbated in scenarios involving mobile or remote workforces where devices may be lost or stolen. Additionally, the bypass of BitLocker protections undermines compliance with data protection regulations such as the GDPR, potentially leading to legal and financial repercussions. The availability impact is also high, as attackers could corrupt or erase encrypted data. Although the attack requires physical access, the low complexity and lack of need for authentication make it a realistic threat in environments with insufficient physical security controls.

Mitigation Recommendations

European organizations should implement strict physical security controls to prevent unauthorized access to devices, including secure storage, access logging, and surveillance in sensitive areas. They should also consider upgrading affected systems from Windows 10 Version 1809 to later, supported versions of Windows 10 or Windows 11 where this vulnerability is presumably addressed. Until patches are available, organizations can enforce multi-factor authentication for device access and use additional encryption layers or hardware security modules (HSMs) to protect sensitive data. Regular audits of device inventory and encryption status should be conducted. Endpoint detection and response (EDR) solutions can be configured to alert on suspicious physical access or tampering attempts. Additionally, organizations should educate employees on the risks of device loss and enforce policies for immediate reporting and response. Backup strategies should be reviewed to ensure data integrity and availability in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-26T17:09:49.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d46f40f0eb72f91b64

Added to database: 7/8/2025, 5:09:40 PM

Last enriched: 8/7/2025, 12:51:21 AM

Last updated: 8/12/2025, 12:33:54 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats