Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53136: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-53136cvecve-2025-53136cwe-200
Published: Tue Aug 12 2025 (08/12/2025, 17:10:13 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 10/15/2025, 17:30:39 UTC

Technical Analysis

CVE-2025-53136 is a vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. It affects Microsoft Windows 10 Version 1809 (build 10.0.17763.0) specifically within the Windows NT OS Kernel. The vulnerability allows an attacker with local privileges to access sensitive information that should otherwise be protected by the kernel's security boundaries. The attack vector is local, requiring the attacker to have some level of access to the system (low complexity), but no user interaction is needed. The vulnerability does not allow modification or disruption of system operations (integrity and availability are unaffected), but the confidentiality impact is high as sensitive data can be disclosed. The CVSS v3.1 base score is 5.5, reflecting a medium severity level. No exploits have been reported in the wild, and no patches have been published at the time of analysis. This vulnerability could be leveraged for further attacks, such as privilege escalation or lateral movement, by providing attackers with valuable information about the system internals or security mechanisms. The lack of user interaction requirement increases the risk in environments where multiple users have local access. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information from systems running Windows 10 Version 1809. This could include corporate secrets, user credentials, or system configuration details that attackers could use to facilitate further attacks. Sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data and regulatory requirements around data protection (e.g., GDPR). The requirement for local access limits remote exploitation but does not eliminate risk in environments with shared or multi-user systems, remote desktop access, or insider threats. The vulnerability could undermine trust in affected systems and lead to compliance issues if sensitive data is exposed. Although no active exploits are known, the medium severity score suggests that exploitation could have meaningful consequences if leveraged in targeted attacks.

Mitigation Recommendations

1. Restrict local access strictly to trusted users and minimize the number of accounts with local privileges on Windows 10 Version 1809 systems. 2. Monitor and audit local user activities for unusual behavior that might indicate attempts to exploit this vulnerability. 3. Apply any security updates or patches released by Microsoft for this vulnerability as soon as they become available. 4. Consider upgrading affected systems to a more recent, supported Windows version that is not vulnerable. 5. Implement endpoint detection and response (EDR) solutions capable of detecting suspicious kernel-level access or information disclosure attempts. 6. Use application whitelisting and privilege management to reduce the attack surface. 7. Educate local users about the risks of unauthorized software execution and the importance of maintaining system security. 8. In environments where local access cannot be fully controlled, employ network segmentation and strong access controls to limit lateral movement opportunities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-26T17:56:53.996Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774bad5a09ad003491a3

Added to database: 8/12/2025, 5:18:03 PM

Last enriched: 10/15/2025, 5:30:39 PM

Last updated: 10/16/2025, 7:22:51 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats