Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59192: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59192cvecve-2025-59192cwe-126
Published: Tue Oct 14 2025 (10/14/2025, 17:01:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/27/2025, 02:55:03 UTC

Technical Analysis

CVE-2025-59192 is a buffer over-read vulnerability classified under CWE-126, found in the Storport.sys driver component of Microsoft Windows 10 Version 1809 (build 17763.0). The flaw arises due to improper bounds checking in the driver’s handling of certain memory buffers, which allows an attacker with authorized local access to read beyond the intended buffer limits. This can lead to privilege escalation by corrupting or leaking sensitive kernel memory, enabling the attacker to execute code with elevated privileges. The vulnerability requires local privileges (PR:L) but no user interaction (UI:N), and has a low attack complexity (AC:L). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability’s nature and severity make it a significant risk for environments running this outdated Windows version. The Storport.sys driver is critical for storage port operations, so exploitation could disrupt system stability and data integrity. The vulnerability was published on October 14, 2025, with no patches yet available, emphasizing the need for vigilance and interim mitigations. Given the age of Windows 10 1809, many organizations may have migrated, but legacy systems remain vulnerable. Attackers could leverage this flaw to gain system-level control, bypassing security controls and potentially deploying further malware or ransomware.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those still operating legacy Windows 10 Version 1809 systems in critical infrastructure, government, finance, and industrial sectors. Successful exploitation could lead to full system compromise, exposing sensitive data, disrupting operations, and enabling lateral movement within networks. The high impact on confidentiality, integrity, and availability means that data breaches, system outages, and unauthorized administrative access are plausible outcomes. Since the vulnerability requires local access, insider threats or attackers who have already gained limited footholds could escalate privileges rapidly. This elevates the threat level for organizations with less stringent endpoint security or those allowing remote desktop or VPN access to vulnerable machines. The absence of known exploits currently reduces immediate risk but also means attackers may develop exploits in the near future, increasing urgency for mitigation. European entities with legacy Windows deployments or those in sectors targeted by advanced persistent threats (APTs) should consider this vulnerability a priority.

Mitigation Recommendations

1. Apply Microsoft security updates immediately once they become available for Windows 10 Version 1809 systems. 2. If patches are not yet released, restrict local user access to vulnerable systems by enforcing strict access controls and limiting administrative privileges. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to Storport.sys or privilege escalation attempts. 4. Disable or restrict remote access methods such as RDP or VPN on vulnerable endpoints unless absolutely necessary, and enforce multi-factor authentication (MFA). 5. Conduct thorough audits of systems running Windows 10 1809 to identify and prioritize remediation or upgrade to supported Windows versions. 6. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and encourage prompt reporting of suspicious activity. 7. Use network segmentation to isolate legacy systems and limit potential lateral movement in case of compromise. 8. Monitor security advisories from Microsoft and threat intelligence sources for updates on exploit availability and mitigation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e40543

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 11/27/2025, 2:55:03 AM

Last updated: 11/28/2025, 4:09:58 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats