Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48807: CWE-923: Improper Restriction of Communication Channel to Intended Endpoints in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2025-48807cvecve-2025-48807cwe-923
Published: Tue Aug 12 2025 (08/12/2025, 17:10:44 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:54:36 UTC

Technical Analysis

CVE-2025-48807 is a vulnerability classified under CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints) affecting Microsoft Windows 10 Version 1607, specifically the Hyper-V virtualization component. The vulnerability allows an authorized attacker with local access and low privileges to execute arbitrary code on the host system by exploiting improperly restricted communication channels within Hyper-V. This means that the communication channels intended to be limited to specific endpoints can be manipulated to interact with unintended components, enabling code execution. The CVSS 3.1 base score is 6.7, indicating a medium severity level. The attack vector is local (AV:L), requiring high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits or patches are currently available, and the vulnerability was reserved in May 2025 and published in August 2025. The vulnerability affects Windows 10 Version 1607 build 10.0.14393.0, which is an older version of Windows 10, but still in use in some environments. The flaw could be leveraged by attackers who have local access to the system, such as through social engineering or insider threats, to escalate privileges or execute malicious code within the Hyper-V environment, potentially compromising virtual machines or the host system. This vulnerability highlights the importance of securing virtualization platforms and restricting local access to trusted users only.

Potential Impact

The potential impact of CVE-2025-48807 is significant for organizations using Windows 10 Version 1607 with Hyper-V enabled. Successful exploitation allows an attacker with local access to execute arbitrary code, which can lead to full system compromise, including unauthorized access to sensitive data, modification or destruction of data, and disruption of services. This can affect virtualized environments, potentially compromising multiple virtual machines or the host system itself. Organizations relying on Hyper-V for virtualization in enterprise, government, or critical infrastructure sectors could face operational disruptions, data breaches, and loss of trust. Since the vulnerability requires local access and user interaction, the risk is somewhat mitigated but remains critical in environments where local user accounts are shared, poorly controlled, or exposed to social engineering attacks. The lack of available patches increases the risk window, emphasizing the need for proactive mitigation. Additionally, this vulnerability could be leveraged in multi-tenant environments or by malicious insiders, increasing the threat to cloud service providers and enterprises using Hyper-V virtualization.

Mitigation Recommendations

To mitigate CVE-2025-48807, organizations should implement the following specific measures: 1) Restrict local user access to systems running Windows 10 Version 1607 with Hyper-V enabled, ensuring only trusted and authorized personnel have login privileges. 2) Disable Hyper-V on systems where virtualization is not required to eliminate the attack surface. 3) Apply strict user account control policies to limit the ability of low-privilege users to execute unauthorized code or interact with Hyper-V components. 4) Monitor local system activity for unusual behavior indicative of exploitation attempts, such as unexpected Hyper-V communication or code execution patterns. 5) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious local activities. 6) Prepare for patch deployment by closely monitoring Microsoft security advisories for updates addressing this vulnerability. 7) Educate users about the risks of social engineering and the importance of not executing untrusted code or interacting with suspicious prompts. 8) In multi-tenant or cloud environments, enforce strict tenant isolation and access controls to prevent lateral movement via this vulnerability. These targeted actions go beyond generic advice by focusing on local access restrictions, Hyper-V usage policies, and proactive monitoring tailored to this vulnerability’s characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-26T17:09:49.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b7749ad5a09ad003490f4

Added to database: 8/12/2025, 5:18:01 PM

Last enriched: 2/27/2026, 2:54:36 AM

Last updated: 3/25/2026, 4:28:05 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses