Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49678: CWE-476: NULL Pointer Dereference in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-49678cvecve-2025-49678cwe-476cwe-362
Published: Tue Jul 08 2025 (07/08/2025, 16:57:54 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Null pointer dereference in Windows NTFS allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:48:05 UTC

Technical Analysis

CVE-2025-49678 is a vulnerability identified in Microsoft Windows 10 Version 1507, specifically within the NTFS file system driver. The flaw is a null pointer dereference (CWE-476), which occurs when the system attempts to access or dereference a pointer that has a null value, leading to undefined behavior such as system crashes or potential arbitrary code execution. This vulnerability allows an attacker with authorized local access and low privileges to escalate their privileges to higher levels, potentially gaining kernel-level control over the system. The vulnerability does not require user interaction but does require the attacker to have some level of access to the system already. The CVSS v3.1 base score is 7.0, indicating high severity, with attack vector local (AV:L), attack complexity high (AC:H), privileges required low (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). The vulnerability is classified under CWE-476 (NULL Pointer Dereference) and also tagged with CWE-362 (Race Condition), suggesting that timing or concurrency issues may contribute to the exploitability. No patches or exploit code are currently publicly available, but the vulnerability is published and recognized by Microsoft. The affected version is an early Windows 10 release (build 10.0.10240.0), which is largely out of mainstream support, increasing the risk for legacy systems still in operation. The flaw could be exploited by attackers to execute arbitrary code in kernel mode, leading to complete system compromise.

Potential Impact

The potential impact of CVE-2025-49678 is significant for organizations running Windows 10 Version 1507. Successful exploitation allows attackers with limited local access to escalate privileges to SYSTEM or kernel level, enabling them to bypass security controls, install persistent malware, access sensitive data, and disrupt system availability. This can lead to full compromise of affected endpoints, lateral movement within networks, and potential data breaches. Since the vulnerability affects the NTFS file system driver, it could also cause system instability or crashes, impacting availability. Organizations relying on legacy Windows 10 systems, especially those in critical infrastructure, government, healthcare, and financial sectors, face heightened risks. The lack of known exploits in the wild currently reduces immediate threat but does not eliminate the risk, as attackers may develop exploits over time. The high attack complexity and requirement for local access limit remote exploitation but insider threats or compromised accounts could leverage this vulnerability effectively.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1507 is outdated and no longer supported. 2. If upgrading is not immediately possible, restrict local access to systems by enforcing strict access controls and monitoring for suspicious activity. 3. Apply any available security updates or hotfixes from Microsoft as soon as they are released. 4. Employ endpoint detection and response (EDR) solutions to detect abnormal behavior indicative of privilege escalation attempts. 5. Conduct regular audits of user privileges and remove unnecessary local accounts or limit their permissions. 6. Implement application whitelisting and least privilege principles to reduce the impact of potential exploits. 7. Monitor system logs for crashes or unusual NTFS-related errors that could indicate exploitation attempts. 8. Educate users about the risks of local privilege escalation and the importance of reporting suspicious system behavior. 9. Consider network segmentation to limit the spread of compromise if an endpoint is exploited. 10. Maintain up-to-date backups to recover quickly from potential system compromise or crashes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T17:28:52.664Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d66f40f0eb72f91c01

Added to database: 7/8/2025, 5:09:42 PM

Last enriched: 2/26/2026, 9:48:05 PM

Last updated: 3/24/2026, 8:27:44 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses