Skip to main content

CVE-2025-48808: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-48808cvecve-2025-48808cwe-200
Published: Tue Jul 08 2025 (07/08/2025, 16:57:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 08/26/2025, 00:52:32 UTC

Technical Analysis

CVE-2025-48808 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The vulnerability exists within the Windows Kernel, a core component responsible for managing system resources and enforcing security boundaries. Specifically, this flaw allows an attacker with limited privileges (requiring local access and low privileges) to disclose sensitive information from the kernel space. The vulnerability does not require user interaction and can be exploited locally, meaning the attacker must have some level of access to the affected system but does not need to trick a user into performing any action. The CVSS v3.1 base score is 5.5, reflecting a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack vector is local, with low attack complexity, requiring low privileges, no user interaction, unchanged scope, and high impact on confidentiality but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could potentially allow attackers to gather sensitive kernel-level information, which might be leveraged for further privilege escalation or to bypass security mechanisms.

Potential Impact

For European organizations, the exposure of sensitive kernel information can have significant security implications. Although the vulnerability does not directly allow code execution or system disruption, the confidentiality breach could facilitate subsequent attacks such as privilege escalation or evasion of security controls. Organizations relying on Windows 10 Version 1809, especially in critical infrastructure, government, finance, healthcare, and industrial sectors, could face increased risk of targeted attacks. The local nature of the exploit means that insider threats or attackers who have gained limited access could leverage this vulnerability to deepen their foothold. This could lead to unauthorized data access, intellectual property theft, or preparation for more damaging exploits. Given that Windows 10 Version 1809 is an older release, some organizations may still be running it due to legacy application dependencies, increasing their exposure. The lack of a patch at the time of publication further elevates risk, necessitating immediate mitigation efforts.

Mitigation Recommendations

1. Upgrade or patch: Organizations should prioritize upgrading to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1809 is out of mainstream support and may not receive timely patches. 2. Restrict local access: Limit the number of users with local access to systems running this version, enforcing strict access controls and monitoring. 3. Use endpoint protection: Deploy advanced endpoint detection and response (EDR) tools capable of detecting suspicious local activities that could indicate exploitation attempts. 4. Harden systems: Disable or restrict unnecessary local accounts and services that could be leveraged by attackers to gain local access. 5. Monitor logs: Implement enhanced logging and monitoring for unusual kernel-level information access or privilege escalation attempts. 6. Network segmentation: Isolate legacy systems running Windows 10 Version 1809 from critical network segments to reduce the impact of potential exploitation. 7. Incident response readiness: Prepare incident response plans specifically addressing local privilege escalation and information disclosure scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-26T17:09:49.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d46f40f0eb72f91b6d

Added to database: 7/8/2025, 5:09:40 PM

Last enriched: 8/26/2025, 12:52:32 AM

Last updated: 9/19/2025, 2:00:22 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats