CVE-2025-55233: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Out-of-bounds read in Windows Projected File System allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-55233 is an out-of-bounds read vulnerability classified under CWE-125 affecting the Windows Projected File System (ProjFS) in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises when the ProjFS component improperly handles memory boundaries, allowing an attacker with authorized local access to read memory outside the allocated buffer. This memory disclosure can lead to privilege escalation by exposing sensitive data or corrupting memory structures that control access rights. The attack vector requires local access with low complexity and no user interaction, making it feasible for insiders or malware that has already gained limited access. The vulnerability impacts confidentiality, integrity, and availability, as it can be leveraged to elevate privileges and potentially execute arbitrary code with higher system rights. The CVSS v3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, and required privileges but no user interaction. No known exploits are currently in the wild, and no patches have been published at the time of analysis. The vulnerability was reserved in August 2025 and published in December 2025, indicating a recent discovery. The affected version is specifically Windows 10 Version 1809, which is an older release but still in use in some environments. The lack of patch links suggests organizations must monitor Microsoft advisories closely for forthcoming updates.
Potential Impact
The primary impact of CVE-2025-55233 is local privilege escalation, which can allow attackers with limited access to gain higher system privileges. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of system operations. Organizations running Windows 10 Version 1809, particularly those with legacy systems or delayed patching practices, face increased risk. Attackers could leverage this vulnerability to bypass security controls, install persistent malware, or move laterally within networks. The confidentiality of sensitive information is at risk due to potential memory disclosure. Integrity and availability are also threatened if attackers manipulate system processes or cause crashes. Although no public exploits are known yet, the vulnerability's characteristics make it a likely target for future exploitation, especially in environments where local access is possible. This elevates the threat level for sectors with critical infrastructure, government agencies, and enterprises relying on legacy Windows 10 deployments.
Mitigation Recommendations
Organizations should prioritize upgrading from Windows 10 Version 1809 to a supported, patched version of Windows as soon as possible, as this version is no longer mainstream supported. Until patches are released, restrict local access to trusted users only and enforce strict access controls to limit who can log on locally. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to the Projected File System or privilege escalation attempts. Use application whitelisting and least privilege principles to reduce the attack surface. Regularly audit local accounts and remove unnecessary privileges. Network segmentation can help contain potential compromises. Stay informed via Microsoft security advisories for the release of patches or workarounds. Consider disabling or limiting the use of Projected File System features if feasible in the environment. Conduct penetration testing focused on privilege escalation vectors to identify exposure. Finally, maintain comprehensive backups and incident response plans to mitigate impact if exploitation occurs.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Japan, Brazil, Russia, South Korea, Canada, Australia
CVE-2025-55233: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Out-of-bounds read in Windows Projected File System allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55233 is an out-of-bounds read vulnerability classified under CWE-125 affecting the Windows Projected File System (ProjFS) in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises when the ProjFS component improperly handles memory boundaries, allowing an attacker with authorized local access to read memory outside the allocated buffer. This memory disclosure can lead to privilege escalation by exposing sensitive data or corrupting memory structures that control access rights. The attack vector requires local access with low complexity and no user interaction, making it feasible for insiders or malware that has already gained limited access. The vulnerability impacts confidentiality, integrity, and availability, as it can be leveraged to elevate privileges and potentially execute arbitrary code with higher system rights. The CVSS v3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, and required privileges but no user interaction. No known exploits are currently in the wild, and no patches have been published at the time of analysis. The vulnerability was reserved in August 2025 and published in December 2025, indicating a recent discovery. The affected version is specifically Windows 10 Version 1809, which is an older release but still in use in some environments. The lack of patch links suggests organizations must monitor Microsoft advisories closely for forthcoming updates.
Potential Impact
The primary impact of CVE-2025-55233 is local privilege escalation, which can allow attackers with limited access to gain higher system privileges. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of system operations. Organizations running Windows 10 Version 1809, particularly those with legacy systems or delayed patching practices, face increased risk. Attackers could leverage this vulnerability to bypass security controls, install persistent malware, or move laterally within networks. The confidentiality of sensitive information is at risk due to potential memory disclosure. Integrity and availability are also threatened if attackers manipulate system processes or cause crashes. Although no public exploits are known yet, the vulnerability's characteristics make it a likely target for future exploitation, especially in environments where local access is possible. This elevates the threat level for sectors with critical infrastructure, government agencies, and enterprises relying on legacy Windows 10 deployments.
Mitigation Recommendations
Organizations should prioritize upgrading from Windows 10 Version 1809 to a supported, patched version of Windows as soon as possible, as this version is no longer mainstream supported. Until patches are released, restrict local access to trusted users only and enforce strict access controls to limit who can log on locally. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to the Projected File System or privilege escalation attempts. Use application whitelisting and least privilege principles to reduce the attack surface. Regularly audit local accounts and remove unnecessary privileges. Network segmentation can help contain potential compromises. Stay informed via Microsoft security advisories for the release of patches or workarounds. Consider disabling or limiting the use of Projected File System features if feasible in the environment. Conduct penetration testing focused on privilege escalation vectors to identify exposure. Finally, maintain comprehensive backups and incident response plans to mitigate impact if exploitation occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-08-11T20:26:16.631Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693867e174ebaa3babaf6f36
Added to database: 12/9/2025, 6:18:09 PM
Last enriched: 3/1/2026, 12:23:12 AM
Last updated: 3/25/2026, 2:13:03 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.