Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50166: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-50166cvecve-2025-50166cwe-190
Published: Tue Aug 12 2025 (08/12/2025, 17:10:04 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 11/14/2025, 06:31:53 UTC

Technical Analysis

CVE-2025-50166 is classified as an integer overflow or wraparound vulnerability (CWE-190) found in the Windows Distributed Transaction Coordinator (DTC) component of Microsoft Windows 10 Version 1809 (build 17763.0). The flaw arises when the DTC improperly handles integer values, causing an overflow condition that can be exploited by an attacker with authorized network access and low privileges. This overflow can lead to memory corruption scenarios that allow the attacker to disclose sensitive information over the network without requiring user interaction. The vulnerability does not affect system integrity or availability, focusing primarily on confidentiality breaches. The CVSS v3.1 base score is 6.5, reflecting a medium severity level with the attack vector being network-based (AV:N), low attack complexity (AC:L), and requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). No known exploits have been reported in the wild, and no patches or official mitigations have been released as of the publication date (August 12, 2025). This vulnerability is particularly relevant for organizations still operating Windows 10 Version 1809, which is an older but still supported version in some enterprise environments. The DTC service is commonly used in distributed applications and transaction management, making the vulnerability a potential vector for attackers aiming to exfiltrate sensitive transaction data or other confidential information.

Potential Impact

For European organizations, the primary impact of CVE-2025-50166 is the unauthorized disclosure of sensitive information, which can lead to data breaches, loss of intellectual property, or exposure of confidential transaction details. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on Windows 10 Version 1809 and utilize the Distributed Transaction Coordinator service are at higher risk. The vulnerability could be exploited by insider threats or external attackers who have gained low-level network access, potentially bypassing some security controls due to the low complexity of the attack. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could result in regulatory penalties under GDPR and damage to organizational reputation. The lack of patches increases the risk window, making proactive monitoring and mitigation critical. Attackers could leverage this vulnerability as part of a broader attack chain to gather intelligence or prepare for more impactful exploits.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict network access to the Windows Distributed Transaction Coordinator service by enforcing strict firewall rules and network segmentation to limit exposure to authorized systems only. 2) Monitor network traffic for unusual or unauthorized DTC-related communications using intrusion detection/prevention systems (IDS/IPS) and network anomaly detection tools. 3) Apply the principle of least privilege by ensuring that accounts with access to DTC have minimal necessary permissions and review these privileges regularly. 4) Consider upgrading affected systems from Windows 10 Version 1809 to a more recent, supported Windows version where this vulnerability is not present or has been patched. 5) Implement enhanced logging and auditing of DTC activities to detect potential exploitation attempts early. 6) Educate IT and security teams about this specific vulnerability to increase awareness and readiness for applying patches once released. 7) Coordinate with Microsoft support channels for early access to patches or workarounds if available. These targeted actions go beyond generic advice by focusing on reducing the attack surface and improving detection capabilities specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-13T18:35:16.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774bad5a09ad0034916c

Added to database: 8/12/2025, 5:18:03 PM

Last enriched: 11/14/2025, 6:31:53 AM

Last updated: 12/2/2025, 5:52:54 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats