CVE-2025-55699: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1507
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-55699 is an information disclosure vulnerability identified in the Windows Kernel of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, an attacker with authorized local access but limited privileges can exploit this flaw to disclose sensitive kernel data that should otherwise be protected. The vulnerability does not require user interaction and has a low attack complexity, meaning it can be exploited relatively easily by someone with local access. The CVSS v3.1 score of 5.5 reflects a medium severity level, with a high impact on confidentiality but no impact on integrity or availability. The scope is unchanged, meaning the vulnerability affects only the vulnerable component without spreading to other components. There are no known exploits in the wild at the time of publication, and no patches have been released yet. This vulnerability affects an older Windows 10 version (1507), which is the initial release of Windows 10 and is considered legacy. The flaw could allow attackers to gain access to sensitive kernel memory or data structures, potentially exposing credentials, cryptographic keys, or other confidential information. Since the attack requires local access and privileges, it is most relevant in environments where multiple users share systems or where attackers can gain foothold on a device with limited rights. The lack of user interaction requirement increases the risk of automated or stealthy exploitation once local access is obtained.
Potential Impact
The primary impact of CVE-2025-55699 is the unauthorized disclosure of sensitive information from the Windows Kernel, which can compromise confidentiality. This could lead to further attacks such as privilege escalation, credential theft, or lateral movement within an organization’s network. Although the vulnerability does not affect system integrity or availability, the exposure of sensitive kernel data can undermine trust in system security and facilitate more severe attacks. Organizations running Windows 10 Version 1507, especially in multi-user or shared environments, face increased risk of insider threats or attackers who have gained limited local access. The medium severity rating indicates a moderate risk, but the potential for sensitive data leakage makes it significant for sectors handling critical or confidential information. Legacy systems that have not been updated or patched are particularly vulnerable, increasing the attack surface for threat actors. The absence of known exploits in the wild reduces immediate risk but also means organizations should proactively mitigate exposure before attackers develop exploits.
Mitigation Recommendations
Since no official patches are currently available for CVE-2025-55699, organizations should implement compensating controls to reduce risk. These include restricting local access to systems running Windows 10 Version 1507 by enforcing strict user account controls and limiting administrative privileges. Employing endpoint detection and response (EDR) solutions to monitor for unusual local activity or attempts to access kernel memory can help detect exploitation attempts. Organizations should consider upgrading affected systems to a supported and patched version of Windows 10 or later to eliminate the vulnerability. Applying the principle of least privilege to user accounts and services reduces the likelihood of an attacker gaining the necessary local access. Network segmentation and strong authentication mechanisms can limit attacker movement if local access is obtained. Regular auditing of system logs and user activities can help identify suspicious behavior early. Finally, organizations should stay informed about Microsoft’s security advisories for updates or patches addressing this vulnerability.
Affected Countries
United States, China, India, Russia, Germany, United Kingdom, France, Brazil, Japan, South Korea, Canada, Australia
CVE-2025-55699: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1507
Description
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55699 is an information disclosure vulnerability identified in the Windows Kernel of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, an attacker with authorized local access but limited privileges can exploit this flaw to disclose sensitive kernel data that should otherwise be protected. The vulnerability does not require user interaction and has a low attack complexity, meaning it can be exploited relatively easily by someone with local access. The CVSS v3.1 score of 5.5 reflects a medium severity level, with a high impact on confidentiality but no impact on integrity or availability. The scope is unchanged, meaning the vulnerability affects only the vulnerable component without spreading to other components. There are no known exploits in the wild at the time of publication, and no patches have been released yet. This vulnerability affects an older Windows 10 version (1507), which is the initial release of Windows 10 and is considered legacy. The flaw could allow attackers to gain access to sensitive kernel memory or data structures, potentially exposing credentials, cryptographic keys, or other confidential information. Since the attack requires local access and privileges, it is most relevant in environments where multiple users share systems or where attackers can gain foothold on a device with limited rights. The lack of user interaction requirement increases the risk of automated or stealthy exploitation once local access is obtained.
Potential Impact
The primary impact of CVE-2025-55699 is the unauthorized disclosure of sensitive information from the Windows Kernel, which can compromise confidentiality. This could lead to further attacks such as privilege escalation, credential theft, or lateral movement within an organization’s network. Although the vulnerability does not affect system integrity or availability, the exposure of sensitive kernel data can undermine trust in system security and facilitate more severe attacks. Organizations running Windows 10 Version 1507, especially in multi-user or shared environments, face increased risk of insider threats or attackers who have gained limited local access. The medium severity rating indicates a moderate risk, but the potential for sensitive data leakage makes it significant for sectors handling critical or confidential information. Legacy systems that have not been updated or patched are particularly vulnerable, increasing the attack surface for threat actors. The absence of known exploits in the wild reduces immediate risk but also means organizations should proactively mitigate exposure before attackers develop exploits.
Mitigation Recommendations
Since no official patches are currently available for CVE-2025-55699, organizations should implement compensating controls to reduce risk. These include restricting local access to systems running Windows 10 Version 1507 by enforcing strict user account controls and limiting administrative privileges. Employing endpoint detection and response (EDR) solutions to monitor for unusual local activity or attempts to access kernel memory can help detect exploitation attempts. Organizations should consider upgrading affected systems to a supported and patched version of Windows 10 or later to eliminate the vulnerability. Applying the principle of least privilege to user accounts and services reduces the likelihood of an attacker gaining the necessary local access. Network segmentation and strong authentication mechanisms can limit attacker movement if local access is obtained. Regular auditing of system logs and user activities can help identify suspicious behavior early. Finally, organizations should stay informed about Microsoft’s security advisories for updates or patches addressing this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-08-13T20:00:27.683Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85873dd1bfb0b7e3f5b3
Added to database: 10/14/2025, 5:16:55 PM
Last enriched: 2/22/2026, 9:02:14 PM
Last updated: 3/24/2026, 3:07:51 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.