Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48807: CWE-923: Improper Restriction of Communication Channel to Intended Endpoints in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-48807cvecve-2025-48807cwe-923
Published: Tue Aug 12 2025 (08/12/2025, 17:10:44 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 11/14/2025, 06:26:02 UTC

Technical Analysis

CVE-2025-48807 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) affecting the Hyper-V virtualization platform. The root cause is an improper restriction of communication channels to intended endpoints (CWE-923), which means that the communication paths within Hyper-V are not adequately confined, allowing an attacker with authorized local access to interact with components or services they should not be able to. This can lead to local code execution with the privileges of the attacker. The vulnerability requires the attacker to have limited privileges (PR:L) and user interaction (UI:R), and the attack complexity is high (AC:H), indicating that exploitation is non-trivial and likely requires specific conditions or user actions. The CVSS v3.1 base score is 6.7, reflecting medium severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other system components. No known exploits have been reported in the wild as of the publication date (August 12, 2025). The vulnerability was reserved in May 2025 and published in August 2025. No patches or updates are linked yet, so mitigation may rely on workarounds or restricting local access until a fix is released.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to environments running Windows 10 Version 1809 with Hyper-V enabled. Since Hyper-V is commonly used in enterprise and government sectors for virtualization and testing, exploitation could allow attackers with local access to execute arbitrary code, potentially leading to data breaches, system compromise, or disruption of critical services. The impact on confidentiality, integrity, and availability is high, meaning sensitive data could be exposed or altered, and system operations could be disrupted. However, the requirement for local access and user interaction limits the risk of remote exploitation, reducing the likelihood of widespread automated attacks. Organizations with legacy systems or delayed patching cycles are particularly vulnerable. The absence of known exploits in the wild suggests that immediate exploitation is unlikely but vigilance is necessary. The vulnerability could be leveraged in targeted attacks against high-value assets, especially in sectors such as finance, government, and critical infrastructure within Europe.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 systems to versions later than 1809 where this vulnerability is addressed once patches become available from Microsoft. 2. Restrict local access to systems running Hyper-V to trusted personnel only, using strong access controls and physical security measures. 3. Disable Hyper-V on systems where virtualization is not required to reduce the attack surface. 4. Monitor logs and system behavior for unusual Hyper-V communication channel activity or unauthorized local code execution attempts. 5. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious local activities. 6. Educate users about the risks of interacting with untrusted content or applications that could trigger the required user interaction for exploitation. 7. Maintain an inventory of systems running Windows 10 Version 1809 and plan for timely upgrades or replacements to supported versions. 8. Use network segmentation to isolate critical systems and limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-26T17:09:49.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b7749ad5a09ad003490f4

Added to database: 8/12/2025, 5:18:01 PM

Last enriched: 11/14/2025, 6:26:02 AM

Last updated: 11/28/2025, 2:56:34 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats