Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48822: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2025-48822cvecve-2025-48822cwe-125
Published: Tue Jul 08 2025 (07/08/2025, 16:57:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Out-of-bounds read in Windows Hyper-V allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:15:53 UTC

Technical Analysis

CVE-2025-48822 is an out-of-bounds read vulnerability classified under CWE-125 affecting Microsoft Windows 10 Version 1607, specifically build 10.0.14393.0. The flaw exists within the Windows Hyper-V component, Microsoft's native hypervisor technology. An out-of-bounds read occurs when a program reads data outside the bounds of allocated memory, potentially leading to information disclosure or memory corruption. In this case, the vulnerability allows an unauthorized attacker with local access and requiring user interaction to execute arbitrary code with high impact on confidentiality, integrity, and availability. The CVSS v3.1 base score is 8.6, indicating a high severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impacts on confidentiality, integrity, and availability are all high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet, increasing the risk window for affected systems. This vulnerability is particularly critical for environments running legacy Windows 10 versions that have reached end of support, as they are unlikely to receive automatic security updates. Hyper-V is commonly used in enterprise and cloud environments for virtualization, so exploitation could allow attackers to escape virtual machine isolation or compromise host systems. The vulnerability was reserved in May 2025 and published in July 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the impact of CVE-2025-48822 is significant, especially for those still operating Windows 10 Version 1607 in production environments. The ability for an unauthorized local attacker to execute arbitrary code can lead to full system compromise, data breaches, and disruption of critical services. Organizations using Hyper-V for virtualization in sectors such as finance, healthcare, government, and critical infrastructure face elevated risks due to potential lateral movement and privilege escalation. The vulnerability threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution and system modification, and availability by potentially causing system crashes or denial of service. Since the affected OS version is legacy and out of mainstream support, many organizations may lack timely patches, increasing exposure. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with shared workstations or where social engineering can be leveraged. The changed scope indicates that the vulnerability could impact other system components beyond Hyper-V, amplifying the potential damage.

Mitigation Recommendations

Immediate mitigation should focus on upgrading affected systems to a supported Windows version with active security updates, as Windows 10 Version 1607 is outdated and no patches are currently available. Organizations should audit their environments to identify any remaining systems running this version and prioritize their upgrade or decommissioning. Restrict local access to critical systems by enforcing strict access controls, using endpoint protection solutions, and applying the principle of least privilege to limit user permissions. Implement user awareness training to reduce the risk of social engineering that could trigger user interaction required for exploitation. Monitor system logs and Hyper-V activity for unusual behavior indicative of exploitation attempts. Employ network segmentation to isolate legacy systems and reduce the attack surface. If upgrading is not immediately feasible, consider disabling Hyper-V if it is not essential, or applying any available temporary workarounds recommended by Microsoft or security advisories. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-26T17:09:49.057Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d46f40f0eb72f91b9e

Added to database: 7/8/2025, 5:09:40 PM

Last enriched: 2/14/2026, 10:15:53 AM

Last updated: 3/25/2026, 4:37:06 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses