CVE-2025-55695: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507
Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-55695 is a medium severity vulnerability identified in the Windows WLAN Auto Config Service component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw is an out-of-bounds read (CWE-125), where the service improperly reads memory outside the bounds of a buffer. This can lead to unauthorized disclosure of sensitive information stored in adjacent memory locations. The vulnerability requires an attacker to have local privileges (PR:L) but does not require user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must already have access to the system. The vulnerability affects confidentiality (C:H) but does not impact integrity or availability. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component and not other system components. No exploits have been reported in the wild, and no patches are currently linked, suggesting that mitigation may rely on upgrading or applying future updates from Microsoft. This vulnerability is relevant primarily to legacy systems still running the initial release of Windows 10, which is now several years old and out of mainstream support. The WLAN Auto Config Service manages wireless network connections, so the vulnerability could expose sensitive wireless configuration or credential data if exploited locally.
Potential Impact
The primary impact of CVE-2025-55695 is the potential unauthorized disclosure of sensitive information on affected Windows 10 Version 1507 systems. This could include credentials, configuration data, or other memory-resident sensitive information related to wireless networking. While the vulnerability does not allow code execution or system compromise, the confidentiality breach could facilitate further attacks such as privilege escalation or lateral movement within a network. Organizations still operating legacy Windows 10 Version 1507 systems, especially in environments with sensitive wireless network configurations, face increased risk of data leakage. The requirement for local access limits remote exploitation, but insider threats or attackers with initial footholds could leverage this vulnerability. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for environments with outdated OS versions. Overall, the impact is medium severity due to confidentiality loss without direct integrity or availability effects.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1507 (build 10.0.10240.0) to a supported and fully patched Windows 10 version or later to eliminate the vulnerability. 2. Restrict local access to sensitive systems by enforcing strict access controls and monitoring for unauthorized local logins. 3. Employ endpoint detection and response (EDR) solutions to detect suspicious local activity that could indicate exploitation attempts. 4. Limit the number of users with local privileges on affected systems to reduce the attack surface. 5. Monitor wireless network configurations and credentials for signs of compromise or unauthorized access. 6. Apply any future security updates from Microsoft addressing this vulnerability as soon as they become available. 7. Conduct regular vulnerability assessments and audits to identify legacy systems still running outdated OS versions. 8. Educate users and administrators about the risks of running unsupported OS versions and the importance of timely patching and upgrades.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Japan, South Korea, Brazil, Russia
CVE-2025-55695: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507
Description
Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55695 is a medium severity vulnerability identified in the Windows WLAN Auto Config Service component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw is an out-of-bounds read (CWE-125), where the service improperly reads memory outside the bounds of a buffer. This can lead to unauthorized disclosure of sensitive information stored in adjacent memory locations. The vulnerability requires an attacker to have local privileges (PR:L) but does not require user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must already have access to the system. The vulnerability affects confidentiality (C:H) but does not impact integrity or availability. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component and not other system components. No exploits have been reported in the wild, and no patches are currently linked, suggesting that mitigation may rely on upgrading or applying future updates from Microsoft. This vulnerability is relevant primarily to legacy systems still running the initial release of Windows 10, which is now several years old and out of mainstream support. The WLAN Auto Config Service manages wireless network connections, so the vulnerability could expose sensitive wireless configuration or credential data if exploited locally.
Potential Impact
The primary impact of CVE-2025-55695 is the potential unauthorized disclosure of sensitive information on affected Windows 10 Version 1507 systems. This could include credentials, configuration data, or other memory-resident sensitive information related to wireless networking. While the vulnerability does not allow code execution or system compromise, the confidentiality breach could facilitate further attacks such as privilege escalation or lateral movement within a network. Organizations still operating legacy Windows 10 Version 1507 systems, especially in environments with sensitive wireless network configurations, face increased risk of data leakage. The requirement for local access limits remote exploitation, but insider threats or attackers with initial footholds could leverage this vulnerability. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for environments with outdated OS versions. Overall, the impact is medium severity due to confidentiality loss without direct integrity or availability effects.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1507 (build 10.0.10240.0) to a supported and fully patched Windows 10 version or later to eliminate the vulnerability. 2. Restrict local access to sensitive systems by enforcing strict access controls and monitoring for unauthorized local logins. 3. Employ endpoint detection and response (EDR) solutions to detect suspicious local activity that could indicate exploitation attempts. 4. Limit the number of users with local privileges on affected systems to reduce the attack surface. 5. Monitor wireless network configurations and credentials for signs of compromise or unauthorized access. 6. Apply any future security updates from Microsoft addressing this vulnerability as soon as they become available. 7. Conduct regular vulnerability assessments and audits to identify legacy systems still running outdated OS versions. 8. Educate users and administrators about the risks of running unsupported OS versions and the importance of timely patching and upgrades.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-08-13T20:00:27.683Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85873dd1bfb0b7e3f5a7
Added to database: 10/14/2025, 5:16:55 PM
Last enriched: 3/1/2026, 11:56:28 PM
Last updated: 3/24/2026, 9:30:07 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.