Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50166: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-50166cvecve-2025-50166cwe-190
Published: Tue Aug 12 2025 (08/12/2025, 17:10:04 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:40:50 UTC

Technical Analysis

CVE-2025-50166 is a vulnerability classified under CWE-190 (Integer Overflow or Wraparound) affecting the Windows Distributed Transaction Coordinator (DTC) service in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability stems from improper validation of integer values within the DTC component, which can lead to an overflow or wraparound condition during processing. This flaw allows an attacker with authorized access (requiring at least low privileges) to exploit the overflow to disclose sensitive information over the network. The vulnerability does not require user interaction and does not impact system integrity or availability, focusing solely on confidentiality breaches. The CVSS v3.1 score is 6.5, reflecting a medium severity due to network attack vector, low attack complexity, and the requirement for privileges. No public exploits or patches have been reported as of the publication date (August 12, 2025). The affected Windows 10 version 1507 is an early release, which is generally out of mainstream support, increasing the risk for organizations still running legacy systems. The DTC service is critical for coordinating distributed transactions across multiple resource managers, so exploitation could expose transaction data or related sensitive information. The lack of patches necessitates proactive mitigation strategies.

Potential Impact

For European organizations, the primary impact of CVE-2025-50166 is the potential unauthorized disclosure of sensitive information managed by the Distributed Transaction Coordinator service. This could include transaction details or other data involved in distributed operations, potentially exposing confidential business or customer information. Organizations in finance, manufacturing, and critical infrastructure sectors that rely on legacy Windows 10 systems with DTC are particularly at risk. Although the vulnerability does not allow code execution or system disruption, information leakage can facilitate further attacks or compliance violations under GDPR and other data protection regulations. The requirement for authorized access limits the threat to insiders or attackers who have already compromised low-level accounts. However, the network-based nature of the attack vector means that lateral movement within a network could enable exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments where legacy systems remain unpatched.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately possible, restrict access to the Distributed Transaction Coordinator service by implementing strict network segmentation and limiting user privileges to the minimum necessary. 3. Monitor network traffic for unusual activity related to DTC communications, focusing on anomalous transaction patterns or unexpected data flows. 4. Employ endpoint detection and response (EDR) tools to identify attempts to exploit integer overflow conditions or unauthorized information access. 5. Review and harden access controls for accounts with privileges sufficient to interact with DTC, including enforcing strong authentication and auditing usage. 6. Stay informed on Microsoft advisories for any forthcoming patches or workarounds addressing this vulnerability. 7. Conduct regular vulnerability assessments and penetration tests targeting legacy systems to identify and remediate similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-13T18:35:16.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774bad5a09ad0034916c

Added to database: 8/12/2025, 5:18:03 PM

Last enriched: 2/14/2026, 10:40:50 AM

Last updated: 3/25/2026, 5:48:53 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses