CVE-2025-58729: CWE-1287: Improper Validation of Specified Type of Input in Microsoft Windows 10 Version 1507
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-58729 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) within the Local Session Manager (LSM) component. The root cause is improper validation of the specified type of input, classified under CWE-1287. This flaw allows an authorized attacker—meaning one with some level of system privileges—to send specially crafted input over the network to the LSM service, triggering a denial of service condition. The vulnerability does not require user interaction and has a low attack complexity, making exploitation relatively straightforward for authorized users. The impact is limited to availability, with no compromise of confidentiality or integrity. The CVSS v3.1 base score is 6.5, reflecting a medium severity level. No patches are currently linked, and no known exploits have been observed in the wild, indicating that the vulnerability is newly disclosed or not yet weaponized. The affected product is a legacy Windows 10 version (1507), which is the initial release of Windows 10 and is largely superseded by newer versions. The vulnerability could be leveraged in environments where legacy systems remain in use, potentially disrupting critical services dependent on Windows 10 LSM functionality over the network.
Potential Impact
The primary impact of CVE-2025-58729 is denial of service, which can disrupt availability of systems running Windows 10 Version 1507. Organizations relying on legacy Windows 10 installations may experience service interruptions, affecting business continuity and operational stability. Since the vulnerability requires authorized access, attackers with limited privileges could escalate disruption capabilities without needing to compromise confidentiality or integrity. This could be particularly impactful in networked environments where LSM services are exposed or accessible to internal threat actors or compromised accounts. Although no known exploits exist currently, the medium severity score and ease of exploitation suggest a moderate risk. Enterprises that have not upgraded from Windows 10 Version 1507 or maintain legacy systems for compatibility reasons are most vulnerable. The disruption could affect critical infrastructure, internal corporate networks, or service providers using affected Windows versions, potentially leading to downtime and associated financial and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-58729, organizations should prioritize upgrading from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later. Since no patches are currently linked, upgrading is the most effective immediate measure. Network segmentation should be enforced to limit access to systems running the vulnerable version, especially restricting LSM-related network traffic to trusted and authorized users only. Implement strict access controls and monitor for unusual activity from authorized users that could indicate exploitation attempts. Employ network-level protections such as firewalls and intrusion detection/prevention systems to detect and block malformed input targeting LSM services. Additionally, organizations should maintain an inventory of legacy systems and plan for their timely decommissioning or upgrade to reduce exposure. Regularly review security advisories from Microsoft for updates or patches addressing this vulnerability. Finally, conduct internal awareness and training to ensure that administrators understand the risks associated with legacy Windows versions and the importance of applying security updates.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Japan, Brazil, Russia, Canada
CVE-2025-58729: CWE-1287: Improper Validation of Specified Type of Input in Microsoft Windows 10 Version 1507
Description
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-58729 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) within the Local Session Manager (LSM) component. The root cause is improper validation of the specified type of input, classified under CWE-1287. This flaw allows an authorized attacker—meaning one with some level of system privileges—to send specially crafted input over the network to the LSM service, triggering a denial of service condition. The vulnerability does not require user interaction and has a low attack complexity, making exploitation relatively straightforward for authorized users. The impact is limited to availability, with no compromise of confidentiality or integrity. The CVSS v3.1 base score is 6.5, reflecting a medium severity level. No patches are currently linked, and no known exploits have been observed in the wild, indicating that the vulnerability is newly disclosed or not yet weaponized. The affected product is a legacy Windows 10 version (1507), which is the initial release of Windows 10 and is largely superseded by newer versions. The vulnerability could be leveraged in environments where legacy systems remain in use, potentially disrupting critical services dependent on Windows 10 LSM functionality over the network.
Potential Impact
The primary impact of CVE-2025-58729 is denial of service, which can disrupt availability of systems running Windows 10 Version 1507. Organizations relying on legacy Windows 10 installations may experience service interruptions, affecting business continuity and operational stability. Since the vulnerability requires authorized access, attackers with limited privileges could escalate disruption capabilities without needing to compromise confidentiality or integrity. This could be particularly impactful in networked environments where LSM services are exposed or accessible to internal threat actors or compromised accounts. Although no known exploits exist currently, the medium severity score and ease of exploitation suggest a moderate risk. Enterprises that have not upgraded from Windows 10 Version 1507 or maintain legacy systems for compatibility reasons are most vulnerable. The disruption could affect critical infrastructure, internal corporate networks, or service providers using affected Windows versions, potentially leading to downtime and associated financial and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-58729, organizations should prioritize upgrading from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later. Since no patches are currently linked, upgrading is the most effective immediate measure. Network segmentation should be enforced to limit access to systems running the vulnerable version, especially restricting LSM-related network traffic to trusted and authorized users only. Implement strict access controls and monitor for unusual activity from authorized users that could indicate exploitation attempts. Employ network-level protections such as firewalls and intrusion detection/prevention systems to detect and block malformed input targeting LSM services. Additionally, organizations should maintain an inventory of legacy systems and plan for their timely decommissioning or upgrade to reduce exposure. Regularly review security advisories from Microsoft for updates or patches addressing this vulnerability. Finally, conduct internal awareness and training to ensure that administrators understand the risks associated with legacy Windows versions and the importance of applying security updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-03T20:46:29.257Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85893dd1bfb0b7e3fd77
Added to database: 10/14/2025, 5:16:57 PM
Last enriched: 2/22/2026, 9:05:48 PM
Last updated: 3/26/2026, 10:27:28 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.