Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54916: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-54916cvecve-2025-54916cwe-121
Published: Tue Sep 09 2025 (09/09/2025, 17:01:00 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:31:10 UTC

Technical Analysis

CVE-2025-54916 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting the NTFS file system driver in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw arises from improper handling of input data within the NTFS driver, leading to a buffer overflow on the stack. This overflow can be exploited by an attacker with authorized local access and limited privileges to execute arbitrary code with elevated privileges. The vulnerability does not require user interaction, increasing its exploitation potential once local access is obtained. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. The vulnerability is currently published but lacks publicly available patches or known exploits in the wild. The affected Windows 10 version is an early release (1507), which is largely superseded by newer versions but may still be present in legacy or specialized environments. Exploitation could allow attackers to escalate privileges, execute malicious payloads, and compromise system stability or data security. Due to the NTFS driver's critical role in file system operations, successful exploitation could severely disrupt system operations.

Potential Impact

The impact of CVE-2025-54916 is significant for organizations still running Windows 10 Version 1507, particularly in environments where legacy systems persist. Successful exploitation allows local attackers with limited privileges to escalate their rights and execute arbitrary code, potentially leading to full system compromise. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by causing system crashes or denial of service. Critical infrastructure, enterprise environments, and government systems relying on legacy Windows 10 installations are at risk of disruption or data breaches. Although exploitation requires local access, insider threats or attackers leveraging other vulnerabilities to gain initial foothold could chain attacks to exploit this flaw. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability's characteristics make it a prime candidate for future exploitation. Organizations failing to address this vulnerability may face increased risk of ransomware, data theft, or operational disruption.

Mitigation Recommendations

Given the lack of official patches linked to this vulnerability, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported, fully patched Windows version to eliminate exposure. If immediate upgrade is not feasible, implement strict access controls to limit local user privileges and reduce the number of authorized users who can log into affected systems. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior indicative of exploitation attempts. Regularly audit and monitor local account activities for suspicious actions. Disable or restrict NTFS driver access where possible in controlled environments, though this may impact functionality. Maintain comprehensive backups and incident response plans to recover from potential exploitation. Stay alert for official patches or advisories from Microsoft and apply them promptly once available. Network segmentation to isolate legacy systems can also reduce the risk of lateral movement following exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-31T18:54:19.613Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e3ce6ed8307545ba88

Added to database: 9/9/2025, 6:28:51 PM

Last enriched: 2/21/2026, 9:31:10 PM

Last updated: 3/26/2026, 7:52:43 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses