CVE-2025-53804: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-53804 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves the exposure of sensitive information to unauthorized actors. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information. Specifically, this flaw exists within the Windows Kernel, a core component responsible for managing system resources and enforcing security boundaries. The vulnerability allows an attacker with authorized local access and low privileges (PR:L) to disclose sensitive information without requiring user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have some level of access to the affected system to exploit the vulnerability. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with a high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component and does not propagate to other components. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in July 2025 and published in September 2025. While the vulnerability does not allow remote exploitation or privilege escalation, the ability to disclose sensitive kernel-level information could aid attackers in further attacks or reconnaissance activities on compromised systems. This vulnerability is particularly relevant for environments where Windows 10 Version 1809 is still in use, especially in legacy or industrial systems that have not been updated to newer versions.
Potential Impact
For European organizations, the exposure of sensitive information at the kernel level can have significant consequences. Confidential data leakage could include system internals, security tokens, or other protected information that attackers could leverage to escalate privileges or move laterally within networks. Although exploitation requires local access and does not directly compromise system integrity or availability, the information disclosed could facilitate more severe attacks, such as privilege escalation or targeted intrusions. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is leaked. Additionally, legacy systems running Windows 10 Version 1809 are common in some industrial and governmental environments across Europe, increasing the potential attack surface. The lack of a patch at the time of publication means organizations must rely on compensating controls to mitigate risk. Overall, the vulnerability poses a moderate risk but should be addressed promptly to prevent potential escalation chains.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several specific mitigations: 1) Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and limiting administrative privileges to trusted personnel only. 2) Employ endpoint detection and response (EDR) solutions to monitor for unusual local activity that could indicate exploitation attempts. 3) Use application whitelisting and privilege management tools to prevent unauthorized code execution or privilege misuse. 4) Where possible, isolate legacy systems from critical network segments to reduce the risk of lateral movement. 5) Plan and prioritize upgrading affected systems to supported Windows versions with security updates. 6) Conduct regular audits of user accounts and local access permissions to ensure minimal exposure. 7) Educate users about the risks of local exploitation and enforce policies to prevent unauthorized physical or remote local access. These targeted steps go beyond generic advice by focusing on limiting local access and monitoring, which are critical given the local attack vector and lack of remote exploitability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2025-53804: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809
Description
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-53804 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves the exposure of sensitive information to unauthorized actors. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information. Specifically, this flaw exists within the Windows Kernel, a core component responsible for managing system resources and enforcing security boundaries. The vulnerability allows an attacker with authorized local access and low privileges (PR:L) to disclose sensitive information without requiring user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have some level of access to the affected system to exploit the vulnerability. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with a high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component and does not propagate to other components. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in July 2025 and published in September 2025. While the vulnerability does not allow remote exploitation or privilege escalation, the ability to disclose sensitive kernel-level information could aid attackers in further attacks or reconnaissance activities on compromised systems. This vulnerability is particularly relevant for environments where Windows 10 Version 1809 is still in use, especially in legacy or industrial systems that have not been updated to newer versions.
Potential Impact
For European organizations, the exposure of sensitive information at the kernel level can have significant consequences. Confidential data leakage could include system internals, security tokens, or other protected information that attackers could leverage to escalate privileges or move laterally within networks. Although exploitation requires local access and does not directly compromise system integrity or availability, the information disclosed could facilitate more severe attacks, such as privilege escalation or targeted intrusions. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is leaked. Additionally, legacy systems running Windows 10 Version 1809 are common in some industrial and governmental environments across Europe, increasing the potential attack surface. The lack of a patch at the time of publication means organizations must rely on compensating controls to mitigate risk. Overall, the vulnerability poses a moderate risk but should be addressed promptly to prevent potential escalation chains.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several specific mitigations: 1) Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and limiting administrative privileges to trusted personnel only. 2) Employ endpoint detection and response (EDR) solutions to monitor for unusual local activity that could indicate exploitation attempts. 3) Use application whitelisting and privilege management tools to prevent unauthorized code execution or privilege misuse. 4) Where possible, isolate legacy systems from critical network segments to reduce the risk of lateral movement. 5) Plan and prioritize upgrading affected systems to supported Windows versions with security updates. 6) Conduct regular audits of user accounts and local access permissions to ensure minimal exposure. 7) Educate users about the risks of local exploitation and enforce policies to prevent unauthorized physical or remote local access. These targeted steps go beyond generic advice by focusing on limiting local access and monitoring, which are critical given the local attack vector and lack of remote exploitability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-07-09T13:40:07.627Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c071e1ce6ed8307545b9b8
Added to database: 9/9/2025, 6:28:49 PM
Last enriched: 9/9/2025, 6:48:47 PM
Last updated: 9/9/2025, 10:50:32 PM
Views: 4
Related Threats
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.