Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48804: CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-48804cvecve-2025-48804cwe-349
Published: Tue Jul 08 2025 (07/08/2025, 16:57:38 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:12:16 UTC

Technical Analysis

CVE-2025-48804 is a vulnerability classified under CWE-349, which pertains to the acceptance of extraneous untrusted data alongside trusted data. This flaw exists in the BitLocker encryption feature of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). BitLocker is designed to protect data confidentiality and integrity by encrypting volumes and preventing unauthorized access. However, this vulnerability allows an attacker with physical access to the device to bypass BitLocker's security mechanisms by exploiting the acceptance of untrusted data mixed with trusted data during the encryption or decryption process. The attacker does not require any privileges or user interaction, but must have physical access to the device, making it a physical attack vector. The CVSS v3.1 score of 6.8 reflects a medium severity, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), low attack complexity, no privileges required, and no user interaction needed. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits have been reported in the wild, and no patches have been published yet, which increases the risk for organizations still running this legacy Windows 10 version. The vulnerability could allow attackers to decrypt or tamper with BitLocker-protected data, potentially leading to data breaches or system compromise. This issue highlights the risks of using outdated operating system versions and the importance of physical security controls to prevent unauthorized device access.

Potential Impact

For European organizations, the impact of CVE-2025-48804 can be significant, particularly for those relying on BitLocker encryption to protect sensitive or regulated data. Successful exploitation compromises the confidentiality, integrity, and availability of encrypted data, potentially exposing personal data, intellectual property, or critical business information. This could lead to regulatory non-compliance under GDPR, financial losses, reputational damage, and operational disruption. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that use legacy Windows 10 systems with BitLocker are at heightened risk. The requirement for physical access limits remote exploitation but increases the threat from insider attacks, theft, or loss of devices. Since no patches are currently available, affected organizations face a window of vulnerability until remediation is possible. The medium severity rating suggests a moderate but tangible risk that necessitates proactive mitigation, especially in environments where physical device security cannot be guaranteed.

Mitigation Recommendations

1. Upgrade all systems running Windows 10 Version 1507 to the latest supported Windows 10 or Windows 11 versions where this vulnerability is not present. 2. Implement strict physical security controls to prevent unauthorized access to devices, including locked rooms, secure storage, and access logging. 3. Use full disk encryption solutions with updated versions and verified security patches to replace vulnerable BitLocker implementations. 4. Enforce endpoint security policies that detect and alert on unauthorized device access or tampering attempts. 5. Maintain an asset inventory to identify and prioritize remediation of legacy systems still running vulnerable Windows versions. 6. Educate employees on the risks of device theft and the importance of reporting lost or stolen hardware immediately. 7. Monitor security advisories from Microsoft for the release of patches or workarounds addressing this vulnerability. 8. Consider additional layers of encryption or data protection for highly sensitive data to mitigate risks from potential BitLocker bypasses. 9. Conduct regular security audits and penetration tests focusing on physical security and encryption controls. 10. Develop incident response plans that include scenarios involving physical compromise of encrypted devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-26T17:09:49.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d46f40f0eb72f91b64

Added to database: 7/8/2025, 5:09:40 PM

Last enriched: 2/14/2026, 10:12:16 AM

Last updated: 3/25/2026, 1:38:54 AM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses