Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59198: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-59198cvecve-2025-59198cwe-20
Published: Tue Oct 14 2025 (10/14/2025, 17:01:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 21:10:43 UTC

Technical Analysis

CVE-2025-59198 is a vulnerability classified under CWE-20 (Improper Input Validation) found in the Windows Search Component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). This flaw allows an authorized attacker with local access to the system to supply crafted input that the search component fails to properly validate, leading to a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability by causing the Windows Search service or related components to crash or become unresponsive. The CVSS v3.1 score is 5.0 (medium severity), reflecting the requirement for local privileges (AV:L), low attack complexity (AC:L), the need for privileges (PR:L), and user interaction (UI:R). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. No exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation may rely on upgrading or awaiting official fixes. The vulnerability is relevant primarily to legacy systems still running the initial release of Windows 10, which is now largely superseded by newer versions. Improper input validation vulnerabilities like this typically arise from insufficient checks on user-supplied data, which can cause unexpected behavior or crashes in system services.

Potential Impact

The primary impact of CVE-2025-59198 is denial of service on affected Windows 10 Version 1507 systems, potentially disrupting user productivity and system availability. Since the vulnerability requires local access and user interaction, remote exploitation is not feasible, limiting the attack surface. Organizations running legacy Windows 10 systems, especially in environments where upgrading is delayed due to compatibility or operational constraints, face increased risk of service interruptions. This could affect endpoint stability, search functionality, and dependent applications. While confidentiality and integrity remain unaffected, availability degradation can impact business operations, particularly in environments relying heavily on Windows Search for file indexing and retrieval. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for internal threat actors or malware that gains local access. Overall, the impact is moderate and primarily operational rather than data-centric.

Mitigation Recommendations

To mitigate CVE-2025-59198, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched Windows release, as this version is outdated and no longer supported by Microsoft. If upgrading is not immediately feasible, administrators should restrict local access to trusted users only and enforce strict user privilege management to minimize the risk of exploitation. Monitoring and auditing local user activities can help detect attempts to exploit this vulnerability. Additionally, disabling or limiting the Windows Search service where it is not essential can reduce exposure. Organizations should stay alert for official patches or security advisories from Microsoft addressing this issue and apply them promptly once available. Implementing application whitelisting and endpoint protection solutions can also help prevent malicious code execution that might leverage this vulnerability. Finally, educating users about the risks of executing untrusted local code or scripts can reduce the likelihood of user interaction leading to exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.464Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e40555

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 2/22/2026, 9:10:43 PM

Last updated: 3/25/2026, 3:54:54 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses