Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49684: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-49684cvecve-2025-49684cwe-126
Published: Tue Jul 08 2025 (07/08/2025, 16:57:58 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Buffer over-read in Storage Port Driver allows an authorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:21:56 UTC

Technical Analysis

CVE-2025-49684 is a buffer over-read vulnerability classified under CWE-126, found in the Storage Port Driver component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). This vulnerability arises when the driver improperly handles memory buffers, allowing an authorized local attacker to read data beyond the allocated buffer boundaries. The flaw does not require user interaction and can be exploited with low complexity given local privileges (PR:L). The vulnerability impacts confidentiality by enabling unauthorized disclosure of sensitive information stored in memory, but it does not affect integrity or availability of the system. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the limited attack vector (local access only) and the absence of integrity or availability impact. No public exploits or active exploitation have been reported, indicating the threat is currently theoretical but should not be ignored. The affected Windows 10 version is the original release (1507), which is largely out of mainstream support, increasing risk for organizations that have not upgraded. The Storage Port Driver is a critical component managing storage device interactions, so information disclosure here could reveal sensitive system or user data. The vulnerability was published on July 8, 2025, and no patches or mitigations have been explicitly linked yet, emphasizing the need for vigilance and proactive defense.

Potential Impact

For European organizations, the primary impact of CVE-2025-49684 is unauthorized local disclosure of sensitive information, which could include system memory contents or data handled by the Storage Port Driver. This can lead to leakage of credentials, encryption keys, or other confidential data, potentially facilitating further attacks such as privilege escalation or lateral movement. The requirement for local access limits remote exploitation, but insider threats or compromised endpoints pose significant risks. Organizations in sectors with strict data protection regulations (e.g., GDPR) face compliance risks if sensitive data is exposed. Legacy systems running Windows 10 Version 1507, especially in critical infrastructure, government, or financial sectors, are vulnerable. The lack of integrity or availability impact reduces the risk of system disruption but does not diminish the confidentiality concerns. The absence of known exploits in the wild suggests a window for remediation before active attacks emerge. However, the persistence of legacy systems in Europe, particularly in industrial and public sectors, elevates the threat relevance.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later to eliminate the vulnerability. 2. If upgrading is not immediately possible, restrict local access to trusted personnel only and enforce strict access controls to minimize the risk of local exploitation. 3. Implement endpoint detection and response (EDR) solutions to monitor for unusual local activity that could indicate exploitation attempts. 4. Conduct regular audits of systems to identify legacy Windows 10 installations and prioritize their remediation. 5. Apply any interim security updates or workarounds released by Microsoft as soon as they become available. 6. Educate users and administrators about the risks of local privilege abuse and enforce the principle of least privilege to limit potential attacker capabilities. 7. Use application whitelisting and device control policies to reduce the risk of unauthorized code execution or device manipulation that could facilitate exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T19:59:44.872Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d66f40f0eb72f91c13

Added to database: 7/8/2025, 5:09:42 PM

Last enriched: 2/14/2026, 10:21:56 AM

Last updated: 3/26/2026, 9:17:55 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses