Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58735: CWE-416: Use After Free in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-58735cvecve-2025-58735cwe-416
Published: Tue Oct 14 2025 (10/14/2025, 17:00:27 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 00:00:30 UTC

Technical Analysis

CVE-2025-58735 is a use-after-free vulnerability classified under CWE-416, found in the Inbox COM objects of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior such as arbitrary code execution. In this case, the vulnerability allows an unauthorized attacker with local access to execute code on the affected system. The attack vector requires local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means that exploitation can lead to complete system compromise. The vulnerability was reserved on September 3, 2025, and published on October 14, 2025. There are currently no known exploits in the wild and no patches have been released, increasing the urgency for mitigation. The vulnerability affects a legacy Windows 10 version, which is less common but still present in some environments. The lack of patches and the high impact make this a critical concern for organizations still running this version. The vulnerability's reliance on local access and user interaction limits remote exploitation but does not diminish the risk in environments where local access can be gained or social engineering is possible.

Potential Impact

The impact of CVE-2025-58735 is significant for organizations running Windows 10 Version 1507. Successful exploitation can lead to arbitrary code execution with high privileges, allowing attackers to compromise system confidentiality, integrity, and availability fully. This can result in data theft, system manipulation, installation of persistent malware, or denial of service. Since the vulnerability requires local access and user interaction, the threat is particularly relevant in environments where attackers can gain physical or remote desktop access or trick users into executing malicious actions. Legacy systems that are no longer supported or patched are especially vulnerable, increasing the risk of targeted attacks or insider threats. The absence of known exploits in the wild currently provides a window for organizations to mitigate risk before active exploitation emerges. However, the high severity and potential for complete system compromise make this a critical issue for affected organizations worldwide.

Mitigation Recommendations

1. Upgrade or patch: Although no patches are currently available, organizations should prioritize upgrading from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later. 2. Restrict local access: Limit physical and remote desktop access to systems running this legacy version to trusted personnel only. 3. Apply least privilege: Ensure users operate with the minimum necessary privileges to reduce the impact of local exploitation. 4. User training: Educate users about the risks of social engineering and the importance of not executing untrusted code or files. 5. Monitor and detect: Implement endpoint detection and response (EDR) solutions to monitor for suspicious activity indicative of exploitation attempts. 6. Network segmentation: Isolate legacy systems from critical network segments to limit lateral movement if compromised. 7. Disable or restrict COM object usage where possible, especially Inbox COM objects, to reduce the attack surface. 8. Maintain up-to-date backups to enable recovery in case of compromise. These steps go beyond generic advice by focusing on the specific affected version, attack vector, and exploitation requirements.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85893dd1bfb0b7e3fd89

Added to database: 10/14/2025, 5:16:57 PM

Last enriched: 3/2/2026, 12:00:30 AM

Last updated: 3/25/2026, 1:50:54 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses