Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49679: CWE-197: Numeric Truncation Error in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-49679cvecve-2025-49679cwe-197
Published: Tue Jul 08 2025 (07/08/2025, 16:57:55 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Numeric truncation error in Windows Shell allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:20:53 UTC

Technical Analysis

CVE-2025-49679 is a numeric truncation error vulnerability classified under CWE-197 that affects Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability exists within the Windows Shell component, where improper handling of numeric values leads to truncation errors. This flaw can be exploited by an attacker with authorized local access to escalate privileges on the affected system. The truncation error likely causes incorrect processing of security-related numeric data, enabling privilege escalation by bypassing normal access controls or security checks. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No public exploits are currently known, and no patches have been linked yet, but the vulnerability is officially published and recognized. The affected product is an early release of Windows 10, which is now largely superseded by newer versions, but may still be in use in legacy environments. The vulnerability's exploitation does not require user interaction, making it more dangerous in environments where local access is possible. This vulnerability highlights the risks of outdated operating systems and the importance of proper numeric data handling in security-critical components like the Windows Shell.

Potential Impact

For European organizations, the impact of CVE-2025-49679 can be significant, particularly in sectors where legacy Windows 10 Version 1507 systems remain operational, such as industrial control systems, government agencies, and certain enterprises with slow upgrade cycles. Successful exploitation allows an attacker with local access to escalate privileges, potentially gaining administrative control over affected machines. This can lead to unauthorized access to sensitive data, disruption of critical services, and the ability to deploy further malware or ransomware. The high impact on confidentiality, integrity, and availability means that compromised systems could be used as footholds for lateral movement within networks, increasing the risk of widespread compromise. Although exploitation requires local access, insider threats or attackers who gain initial footholds through other means could leverage this vulnerability to deepen their control. The lack of user interaction requirement further increases the risk in automated or unattended environments. European organizations with strict data protection regulations (e.g., GDPR) face additional compliance risks if breaches occur due to this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-49679, European organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a currently supported and patched Windows version, as this early release is no longer supported and lacks security updates. In environments where immediate upgrades are not feasible, organizations should implement strict access controls to limit local access to trusted users only, reducing the risk of exploitation. Employing endpoint detection and response (EDR) solutions can help identify suspicious privilege escalation attempts. Regular auditing of user privileges and monitoring for unusual activity on legacy systems is critical. Network segmentation can isolate vulnerable systems to prevent lateral movement. If any patches or workarounds become available from Microsoft, they should be applied promptly. Additionally, organizations should educate users and administrators about the risks of running unsupported OS versions and enforce policies to phase out legacy systems. Implementing application whitelisting and restricting execution of unauthorized code can further reduce exploitation chances.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T17:28:52.664Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d66f40f0eb72f91c04

Added to database: 7/8/2025, 5:09:42 PM

Last enriched: 2/14/2026, 10:20:53 AM

Last updated: 3/22/2026, 8:35:55 PM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses