Skip to main content

CVE-2025-49742: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-49742cvecve-2025-49742cwe-190cwe-122
Published: Tue Jul 08 2025 (07/08/2025, 16:58:17 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 08/19/2025, 01:08:49 UTC

Technical Analysis

CVE-2025-49742 is a high-severity integer overflow or wraparound vulnerability identified in the Microsoft Graphics Component of Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability stems from improper handling of integer values within the graphics processing code, which can lead to an integer overflow or wraparound condition. This flaw can be exploited by an authorized local attacker to execute arbitrary code on the affected system. The attacker must have at least low-level privileges (PR:L) and does not require user interaction (UI:N) to trigger the vulnerability. The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation allows code execution with the privileges of the attacker, potentially leading to privilege escalation or system compromise. The CVSS v3.1 base score is 7.8, reflecting a high severity due to the local attack vector but with low attack complexity and no user interaction required. No known exploits are currently reported in the wild. The vulnerability is specific to Windows 10 Version 1809, which is an older version of Windows 10, and no patch links are currently provided, indicating that mitigation may require workarounds or upgrading to a supported version. The underlying issue is classified under CWE-190 (Integer Overflow or Wraparound), which is a common programming error where arithmetic operations exceed the maximum size of the data type, leading to unexpected behavior and potential security flaws.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to systems still running Windows 10 Version 1809, which may be present in legacy environments or specialized industrial systems. Exploitation could allow attackers with local access to execute arbitrary code, potentially leading to data breaches, disruption of services, or lateral movement within networks. This is particularly critical for sectors with high-value data or critical infrastructure, such as finance, healthcare, manufacturing, and government agencies. The lack of user interaction requirement and low attack complexity increase the risk in environments where multiple users have local access or where attackers have gained limited footholds. The vulnerability could also be leveraged as part of multi-stage attacks to escalate privileges or deploy ransomware. Given the absence of known exploits in the wild, the immediate threat may be moderate, but the potential impact remains high if exploited. Organizations relying on Windows 10 Version 1809 should consider the risk of continued use of this unsupported version, as it may lack other security updates as well.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a more recent, supported Windows 10 or Windows 11 version where this vulnerability is patched or not present. 2. If upgrading is not immediately feasible, restrict local access to affected systems by enforcing strict access controls and monitoring for suspicious activity. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and prevent unauthorized code execution attempts. 4. Regularly audit and minimize the number of users with local privileges on affected systems to reduce the attack surface. 5. Monitor security advisories from Microsoft for the release of patches or official workarounds addressing this vulnerability. 6. Implement network segmentation to isolate legacy systems running Windows 10 Version 1809 from critical infrastructure and sensitive data environments. 7. Conduct user training to raise awareness about the risks of local privilege misuse and encourage reporting of unusual system behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T22:49:37.618Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d86f40f0eb72f91ccc

Added to database: 7/8/2025, 5:09:44 PM

Last enriched: 8/19/2025, 1:08:49 AM

Last updated: 8/22/2025, 12:34:57 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats