Skip to main content

CVE-2025-50173: CWE-1390: Weak Authentication in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-50173cvecve-2025-50173cwe-1390
Published: Tue Aug 12 2025 (08/12/2025, 17:10:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 09/04/2025, 01:12:36 UTC

Technical Analysis

CVE-2025-50173 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-1390, which relates to weak authentication mechanisms. Specifically, this flaw resides within the Windows Installer component, where the authentication process is insufficiently robust. This weakness allows an attacker who already has some level of local access (i.e., an authorized user with limited privileges) to escalate their privileges on the affected system. The CVSS 3.1 base score of 7.8 reflects a high severity, indicating that the vulnerability impacts confidentiality, integrity, and availability with high impact. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. The vulnerability can lead to complete compromise of the affected system by allowing an attacker to gain elevated privileges, potentially enabling them to install malicious software, access sensitive data, or disrupt system operations. No public exploits have been reported yet, and no patches have been linked at the time of this report. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Windows 10 Version 1809 remains in use, such as legacy systems or specialized industrial setups. Successful exploitation could allow attackers to bypass existing access controls and gain administrative privileges, leading to unauthorized data access, system manipulation, or deployment of ransomware and other malware. This could disrupt business operations, compromise sensitive personal and corporate data, and violate data protection regulations such as GDPR. The local attack vector means that insider threats or attackers who gain initial foothold through other means (e.g., phishing, physical access) could leverage this vulnerability to escalate privileges further. Given the high impact on confidentiality, integrity, and availability, organizations could face operational downtime, financial losses, reputational damage, and regulatory penalties.

Mitigation Recommendations

Organizations should prioritize upgrading or patching affected systems as soon as Microsoft releases an official security update addressing CVE-2025-50173. In the interim, practical mitigations include: 1) Restricting local access to systems running Windows 10 Version 1809 by enforcing strict access controls and monitoring local user activities; 2) Employing application whitelisting and endpoint protection solutions to detect and prevent unauthorized privilege escalation attempts; 3) Disabling or limiting the use of Windows Installer where feasible, especially on systems with sensitive data or critical functions; 4) Conducting regular audits of user privileges and removing unnecessary local accounts or rights; 5) Implementing robust physical security controls to prevent unauthorized physical access; 6) Enhancing logging and alerting mechanisms to detect suspicious local activities indicative of exploitation attempts; 7) Planning and executing migration strategies to newer, supported Windows versions with improved security postures to reduce exposure to legacy vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-13T18:35:16.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774bad5a09ad00349181

Added to database: 8/12/2025, 5:18:03 PM

Last enriched: 9/4/2025, 1:12:36 AM

Last updated: 9/4/2025, 11:04:05 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats