CVE-2025-49723: CWE-862: Missing Authorization in Microsoft Windows 10 Version 1809
Missing authorization in Windows StateRepository API allows an authorized attacker to perform tampering locally.
AI Analysis
Technical Summary
CVE-2025-49723 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) involving a missing authorization check in the Windows StateRepository API. This API is responsible for managing state data related to applications and system components. The vulnerability is classified under CWE-862, which pertains to missing authorization, meaning that the system fails to properly verify whether a user or process has the necessary permissions to perform certain actions. In this case, an authorized attacker with local access and low privileges (PR:L) can exploit this flaw to tamper with the system by manipulating state data without proper authorization. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), making exploitation more feasible. The scope is classified as changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting system-wide confidentiality, integrity, and availability. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently in the wild, the vulnerability's characteristics suggest that it could be leveraged for privilege escalation, persistence, or disruption of system operations by tampering with critical state data. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring. Given the affected product is Windows 10 Version 1809, which is an older but still in-use version, systems running this version are at risk if not updated or mitigated.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where Windows 10 Version 1809 remains in use, such as legacy systems or specialized industrial setups. Successful exploitation could lead to unauthorized modification of system state data, potentially allowing attackers to escalate privileges, maintain persistence, or disrupt critical services. This can compromise the confidentiality of sensitive data, integrity of system configurations, and availability of essential services. Sectors such as finance, healthcare, government, and critical infrastructure in Europe could face operational disruptions, data breaches, or regulatory non-compliance consequences. The local attack vector means that attackers need some level of access already, which could be achieved through social engineering, insider threats, or other initial footholds. The changed scope indicates that the impact could extend beyond the immediate component, affecting broader system security. The absence of known exploits currently provides a window for proactive defense, but organizations should not delay remediation efforts.
Mitigation Recommendations
1. Immediate patching is the most effective mitigation; however, as no patches are currently available, organizations should prioritize upgrading affected systems to a supported and patched Windows version. 2. Implement strict access controls and monitoring on systems running Windows 10 Version 1809 to limit local access to trusted users only. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual activity related to the StateRepository API or unauthorized tampering attempts. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or restrict their permissions to minimize the attack surface. 5. Use application whitelisting and integrity monitoring to detect unauthorized changes to system state data. 6. Educate users and administrators about the risks of local privilege escalation and enforce strong physical and network security controls to prevent unauthorized local access. 7. Prepare incident response plans specifically addressing potential exploitation of local authorization vulnerabilities to ensure rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-49723: CWE-862: Missing Authorization in Microsoft Windows 10 Version 1809
Description
Missing authorization in Windows StateRepository API allows an authorized attacker to perform tampering locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-49723 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) involving a missing authorization check in the Windows StateRepository API. This API is responsible for managing state data related to applications and system components. The vulnerability is classified under CWE-862, which pertains to missing authorization, meaning that the system fails to properly verify whether a user or process has the necessary permissions to perform certain actions. In this case, an authorized attacker with local access and low privileges (PR:L) can exploit this flaw to tamper with the system by manipulating state data without proper authorization. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), making exploitation more feasible. The scope is classified as changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting system-wide confidentiality, integrity, and availability. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently in the wild, the vulnerability's characteristics suggest that it could be leveraged for privilege escalation, persistence, or disruption of system operations by tampering with critical state data. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring. Given the affected product is Windows 10 Version 1809, which is an older but still in-use version, systems running this version are at risk if not updated or mitigated.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where Windows 10 Version 1809 remains in use, such as legacy systems or specialized industrial setups. Successful exploitation could lead to unauthorized modification of system state data, potentially allowing attackers to escalate privileges, maintain persistence, or disrupt critical services. This can compromise the confidentiality of sensitive data, integrity of system configurations, and availability of essential services. Sectors such as finance, healthcare, government, and critical infrastructure in Europe could face operational disruptions, data breaches, or regulatory non-compliance consequences. The local attack vector means that attackers need some level of access already, which could be achieved through social engineering, insider threats, or other initial footholds. The changed scope indicates that the impact could extend beyond the immediate component, affecting broader system security. The absence of known exploits currently provides a window for proactive defense, but organizations should not delay remediation efforts.
Mitigation Recommendations
1. Immediate patching is the most effective mitigation; however, as no patches are currently available, organizations should prioritize upgrading affected systems to a supported and patched Windows version. 2. Implement strict access controls and monitoring on systems running Windows 10 Version 1809 to limit local access to trusted users only. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual activity related to the StateRepository API or unauthorized tampering attempts. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or restrict their permissions to minimize the attack surface. 5. Use application whitelisting and integrity monitoring to detect unauthorized changes to system state data. 6. Educate users and administrators about the risks of local privilege escalation and enforce strong physical and network security controls to prevent unauthorized local access. 7. Prepare incident response plans specifically addressing potential exploitation of local authorization vulnerabilities to ensure rapid containment and recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T21:23:11.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686d50d76f40f0eb72f91c8b
Added to database: 7/8/2025, 5:09:43 PM
Last enriched: 8/7/2025, 1:08:41 AM
Last updated: 8/14/2025, 10:52:12 AM
Views: 23
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.