Skip to main content

CVE-2025-53136: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-53136cvecve-2025-53136cwe-200
Published: Tue Aug 12 2025 (08/12/2025, 17:10:13 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 08/12/2025, 19:23:35 UTC

Technical Analysis

CVE-2025-53136 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. Specifically, this flaw exists within the Windows NT OS Kernel and allows an authorized local attacker with limited privileges (low privileges) to disclose sensitive information without requiring any user interaction. The vulnerability does not impact system integrity or availability but compromises confidentiality by allowing unauthorized disclosure of sensitive data. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the attack vector being local (AV:L), low attack complexity (AC:L), and requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. No known exploits are currently observed in the wild, and no patches have yet been linked or published. The vulnerability could be leveraged by attackers who have already gained limited local access to the system to extract sensitive kernel-level information, potentially aiding further privilege escalation or lateral movement within a networked environment.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where Windows 10 Version 1809 is still in use, particularly in legacy systems or specialized industrial and enterprise setups that have not been updated to newer Windows versions. The exposure of sensitive kernel information could facilitate attackers in crafting more effective attacks, including privilege escalation or bypassing security controls, thereby increasing the risk of data breaches or system compromise. Confidentiality of sensitive data is at risk, which could include cryptographic keys, authentication tokens, or other critical system information. Although the vulnerability requires local access and some privileges, insider threats or attackers who have gained foothold through other means could exploit this to deepen their access. Given the widespread use of Windows 10 in European enterprises, especially in sectors such as finance, healthcare, manufacturing, and government, the potential impact includes increased risk of data leakage and subsequent regulatory and reputational consequences under GDPR and other data protection frameworks.

Mitigation Recommendations

Organizations should prioritize upgrading or patching systems running Windows 10 Version 1809 to later supported versions of Windows 10 or Windows 11 where this vulnerability is not present or has been remediated. In the absence of an official patch, applying strict access controls to limit local user privileges is critical. Employing endpoint detection and response (EDR) solutions to monitor for suspicious local activity can help detect attempts to exploit this vulnerability. Network segmentation and limiting administrative access to critical systems reduce the attack surface. Additionally, organizations should conduct audits to identify systems still running this outdated version and plan for timely upgrades. Implementing strict user account control policies and restricting software installation rights can further reduce the risk of exploitation. Finally, raising awareness among IT staff about this vulnerability and monitoring vendor advisories for forthcoming patches is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-26T17:56:53.996Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774bad5a09ad003491a3

Added to database: 8/12/2025, 5:18:03 PM

Last enriched: 8/12/2025, 7:23:35 PM

Last updated: 8/12/2025, 8:47:54 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats