Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55233: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-55233cvecve-2025-55233cwe-125
Published: Tue Dec 09 2025 (12/09/2025, 17:55:51 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows Projected File System allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:23:12 UTC

Technical Analysis

CVE-2025-55233 is an out-of-bounds read vulnerability classified under CWE-125 affecting the Windows Projected File System (ProjFS) in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises when the ProjFS component improperly handles memory boundaries, allowing an attacker with authorized local access to read memory outside the allocated buffer. This memory disclosure can lead to privilege escalation by exposing sensitive data or corrupting memory structures that control access rights. The attack vector requires local access with low complexity and no user interaction, making it feasible for insiders or malware that has already gained limited access. The vulnerability impacts confidentiality, integrity, and availability, as it can be leveraged to elevate privileges and potentially execute arbitrary code with higher system rights. The CVSS v3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, and required privileges but no user interaction. No known exploits are currently in the wild, and no patches have been published at the time of analysis. The vulnerability was reserved in August 2025 and published in December 2025, indicating a recent discovery. The affected version is specifically Windows 10 Version 1809, which is an older release but still in use in some environments. The lack of patch links suggests organizations must monitor Microsoft advisories closely for forthcoming updates.

Potential Impact

The primary impact of CVE-2025-55233 is local privilege escalation, which can allow attackers with limited access to gain higher system privileges. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of system operations. Organizations running Windows 10 Version 1809, particularly those with legacy systems or delayed patching practices, face increased risk. Attackers could leverage this vulnerability to bypass security controls, install persistent malware, or move laterally within networks. The confidentiality of sensitive information is at risk due to potential memory disclosure. Integrity and availability are also threatened if attackers manipulate system processes or cause crashes. Although no public exploits are known yet, the vulnerability's characteristics make it a likely target for future exploitation, especially in environments where local access is possible. This elevates the threat level for sectors with critical infrastructure, government agencies, and enterprises relying on legacy Windows 10 deployments.

Mitigation Recommendations

Organizations should prioritize upgrading from Windows 10 Version 1809 to a supported, patched version of Windows as soon as possible, as this version is no longer mainstream supported. Until patches are released, restrict local access to trusted users only and enforce strict access controls to limit who can log on locally. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to the Projected File System or privilege escalation attempts. Use application whitelisting and least privilege principles to reduce the attack surface. Regularly audit local accounts and remove unnecessary privileges. Network segmentation can help contain potential compromises. Stay informed via Microsoft security advisories for the release of patches or workarounds. Consider disabling or limiting the use of Projected File System features if feasible in the environment. Conduct penetration testing focused on privilege escalation vectors to identify exposure. Finally, maintain comprehensive backups and incident response plans to mitigate impact if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-08-11T20:26:16.631Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e174ebaa3babaf6f36

Added to database: 12/9/2025, 6:18:09 PM

Last enriched: 3/1/2026, 12:23:12 AM

Last updated: 3/25/2026, 2:13:03 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses