Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49687: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-49687cvecve-2025-49687cwe-125
Published: Tue Jul 08 2025 (07/08/2025, 16:57:14 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Out-of-bounds read in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:22:33 UTC

Technical Analysis

CVE-2025-49687 is an out-of-bounds read vulnerability classified under CWE-125 found in the Microsoft Input Method Editor (IME) component of Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability arises due to improper bounds checking when processing input data, which allows an authorized local attacker to read memory outside the intended buffer boundaries. This memory disclosure can lead to privilege escalation by enabling the attacker to access sensitive information or corrupt memory structures critical for security enforcement. The attack vector requires local access with low complexity and no user interaction, but the attacker must have some level of privileges already (PR:L). The vulnerability has a CVSS v3.1 base score of 8.8, indicating high severity with high impact on confidentiality, integrity, and availability, and scope change (S:C). Although no known exploits are currently in the wild, the vulnerability's nature and impact make it a significant risk for systems running this legacy Windows 10 version. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious mitigation. The vulnerability is particularly relevant for organizations that have not upgraded from early Windows 10 releases, which may still be in use in certain environments due to compatibility or operational constraints.

Potential Impact

The impact of CVE-2025-49687 on European organizations is substantial, especially for those still operating legacy Windows 10 Version 1507 systems. Successful exploitation allows local attackers to escalate privileges, potentially gaining SYSTEM-level access. This could lead to unauthorized access to sensitive data, disruption of critical services, and the ability to deploy further malware or ransomware. Sectors such as government, healthcare, finance, and critical infrastructure in Europe that rely on legacy systems are particularly vulnerable. The confidentiality, integrity, and availability of affected systems can be severely compromised, resulting in data breaches, operational downtime, and regulatory non-compliance under GDPR. The lack of public exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits given the vulnerability details. The scope change means that the attacker can affect resources beyond their initial privileges, increasing the threat to enterprise environments.

Mitigation Recommendations

To mitigate CVE-2025-49687, European organizations should prioritize upgrading from Windows 10 Version 1507 to a supported and patched Windows version, as this legacy build is no longer supported and lacks available patches. If immediate upgrade is not feasible, organizations should restrict local access to affected systems by enforcing strict access controls and limiting user privileges to the minimum necessary. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious IME-related activities. Regularly audit and monitor logs for unusual behavior indicative of privilege escalation attempts. Additionally, disable or restrict the use of IME components if not required for business operations. Maintain robust backup and recovery procedures to mitigate potential damage from exploitation. Stay alert for any forthcoming patches or advisories from Microsoft and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T19:59:44.873Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d66f40f0eb72f91c26

Added to database: 7/8/2025, 5:09:42 PM

Last enriched: 2/14/2026, 10:22:33 AM

Last updated: 3/25/2026, 7:24:23 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses