Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58726: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-58726cvecve-2025-58726cwe-284
Published: Tue Oct 14 2025 (10/14/2025, 17:01:18 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 23:58:53 UTC

Technical Analysis

CVE-2025-58726 is a vulnerability classified under CWE-284 (Improper Access Control) found in the Server Message Block (SMB) Server component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). This vulnerability allows an attacker who is already authorized on the network with low privileges to elevate their privileges remotely over the network without requiring user interaction. The flaw stems from insufficient access control checks within the SMB Server, which can be exploited to gain higher-level privileges, potentially leading to full system compromise. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to its impact on confidentiality, integrity, and availability, combined with the network attack vector and low privileges required for exploitation. Although no public exploits have been observed in the wild, the vulnerability poses a significant risk to legacy systems still running this early Windows 10 version. The lack of an official patch at the time of publication increases the urgency for organizations to implement compensating controls. Given SMB's critical role in file sharing and network communications, exploitation could enable attackers to move laterally within networks, access sensitive data, and disrupt services. The vulnerability's scope is limited to Windows 10 Version 1507, which is an older release, but environments that have not upgraded remain vulnerable.

Potential Impact

The potential impact of CVE-2025-58726 is substantial for organizations still operating Windows 10 Version 1507. Successful exploitation allows attackers to escalate privileges remotely, which can lead to unauthorized access to sensitive data, modification or deletion of critical files, and disruption of system availability. This can facilitate further attacks such as lateral movement, deployment of malware or ransomware, and compromise of additional networked systems. The vulnerability undermines the confidentiality, integrity, and availability of affected systems. Organizations in sectors with high reliance on legacy Windows 10 deployments, such as manufacturing, healthcare, and government, may face increased risk of targeted attacks. The absence of a patch and known exploits in the wild suggests a window of opportunity for attackers to develop exploits, increasing the threat over time. Additionally, the network-based attack vector means that perimeter defenses alone may not be sufficient to prevent exploitation if internal network access is gained.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-58726, organizations should prioritize upgrading affected systems to a supported and patched version of Windows 10 or later. If immediate upgrade is not feasible, restrict SMB traffic using network segmentation and firewall rules to limit SMB access only to trusted hosts and networks. Disable SMBv1 if still enabled, as it is deprecated and often exploited. Implement strict access controls and monitoring on SMB servers to detect unusual access patterns or privilege escalation attempts. Employ network intrusion detection/prevention systems (IDS/IPS) capable of identifying SMB-related attacks. Regularly audit user privileges and remove unnecessary network access rights to minimize the attack surface. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises. Monitoring for any emerging exploit code or patches from Microsoft is critical to respond promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85883dd1bfb0b7e3f8e6

Added to database: 10/14/2025, 5:16:56 PM

Last enriched: 3/1/2026, 11:58:53 PM

Last updated: 3/26/2026, 6:54:20 AM

Views: 719

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses