Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49734: CWE-923: Improper Restriction of Communication Channel to Intended Endpoints in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-49734cvecve-2025-49734cwe-923
Published: Tue Sep 09 2025 (09/09/2025, 17:00:41 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper restriction of communication channel to intended endpoints in Windows PowerShell allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 10/02/2025, 00:39:56 UTC

Technical Analysis

CVE-2025-49734 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It stems from an improper restriction of communication channels to intended endpoints within Windows PowerShell, categorized under CWE-923. This flaw allows an authorized local attacker with low privileges to elevate their privileges on the affected system. Specifically, the vulnerability arises because PowerShell does not adequately restrict communication channels, enabling an attacker to manipulate or redirect communications to unintended endpoints. This can lead to unauthorized execution of commands or code with elevated privileges, compromising system confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.0, reflecting high severity, with attack vector local (AV:L), attack complexity high (AC:H), privileges required low (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in June 2025 and published in September 2025, indicating recent discovery and disclosure. Given the affected product is Windows 10 Version 1809, which is an older but still in-use version of Windows 10, systems running this version remain at risk until patched or mitigated.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Windows 10 Version 1809 remains deployed, such as legacy systems or specialized industrial setups. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full system compromise, unauthorized access to sensitive data, disruption of critical services, and lateral movement within networks. This is particularly concerning for sectors with high regulatory requirements like finance, healthcare, and government, where data confidentiality and system integrity are paramount. The lack of user interaction required for exploitation increases the risk of automated or stealthy attacks. Although no known exploits exist yet, the vulnerability's nature and high impact score suggest that threat actors may develop exploits rapidly, especially targeting organizations slow to update or patch legacy systems. The potential for disruption and data breaches could lead to significant financial losses, reputational damage, and regulatory penalties under GDPR and other European data protection laws.

Mitigation Recommendations

European organizations should prioritize identifying all systems running Windows 10 Version 1809 and assess their exposure. Immediate mitigation steps include: 1) Applying any forthcoming security patches from Microsoft as soon as they are released. 2) If patches are unavailable, consider upgrading affected systems to a supported and updated Windows version to eliminate the vulnerability. 3) Restrict local access to systems by enforcing strict access controls and monitoring for unusual privilege escalation attempts. 4) Implement application whitelisting and PowerShell logging to detect and prevent unauthorized script execution or communication channel manipulation. 5) Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activities indicative of exploitation attempts. 6) Conduct user training to minimize authorized user misuse and enforce the principle of least privilege to reduce the impact of compromised accounts. 7) Regularly audit and harden PowerShell configurations, disabling unnecessary remoting features or restricting communication endpoints where possible. These targeted actions go beyond generic advice by focusing on the specific nature of the vulnerability and the affected environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T21:23:11.524Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e0ce6ed8307545b982

Added to database: 9/9/2025, 6:28:48 PM

Last enriched: 10/2/2025, 12:39:56 AM

Last updated: 10/29/2025, 9:44:06 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats