Skip to main content

CVE-2025-49723: CWE-862: Missing Authorization in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-49723cvecve-2025-49723cwe-862
Published: Tue Jul 08 2025 (07/08/2025, 16:57:23 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Missing authorization in Windows StateRepository API allows an authorized attacker to perform tampering locally.

AI-Powered Analysis

AILast updated: 08/07/2025, 01:08:41 UTC

Technical Analysis

CVE-2025-49723 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) involving a missing authorization check in the Windows StateRepository API. This API is responsible for managing state data related to applications and system components. The vulnerability is classified under CWE-862, which pertains to missing authorization, meaning that the system fails to properly verify whether a user or process has the necessary permissions to perform certain actions. In this case, an authorized attacker with local access and low privileges (PR:L) can exploit this flaw to tamper with the system by manipulating state data without proper authorization. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), making exploitation more feasible. The scope is classified as changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting system-wide confidentiality, integrity, and availability. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently in the wild, the vulnerability's characteristics suggest that it could be leveraged for privilege escalation, persistence, or disruption of system operations by tampering with critical state data. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring. Given the affected product is Windows 10 Version 1809, which is an older but still in-use version, systems running this version are at risk if not updated or mitigated.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Windows 10 Version 1809 remains in use, such as legacy systems or specialized industrial setups. Successful exploitation could lead to unauthorized modification of system state data, potentially allowing attackers to escalate privileges, maintain persistence, or disrupt critical services. This can compromise the confidentiality of sensitive data, integrity of system configurations, and availability of essential services. Sectors such as finance, healthcare, government, and critical infrastructure in Europe could face operational disruptions, data breaches, or regulatory non-compliance consequences. The local attack vector means that attackers need some level of access already, which could be achieved through social engineering, insider threats, or other initial footholds. The changed scope indicates that the impact could extend beyond the immediate component, affecting broader system security. The absence of known exploits currently provides a window for proactive defense, but organizations should not delay remediation efforts.

Mitigation Recommendations

1. Immediate patching is the most effective mitigation; however, as no patches are currently available, organizations should prioritize upgrading affected systems to a supported and patched Windows version. 2. Implement strict access controls and monitoring on systems running Windows 10 Version 1809 to limit local access to trusted users only. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual activity related to the StateRepository API or unauthorized tampering attempts. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or restrict their permissions to minimize the attack surface. 5. Use application whitelisting and integrity monitoring to detect unauthorized changes to system state data. 6. Educate users and administrators about the risks of local privilege escalation and enforce strong physical and network security controls to prevent unauthorized local access. 7. Prepare incident response plans specifically addressing potential exploitation of local authorization vulnerabilities to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T21:23:11.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d76f40f0eb72f91c8b

Added to database: 7/8/2025, 5:09:43 PM

Last enriched: 8/7/2025, 1:08:41 AM

Last updated: 8/14/2025, 10:52:12 AM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats