Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59280: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1809

0
Low
VulnerabilityCVE-2025-59280cvecve-2025-59280cwe-287
Published: Tue Oct 14 2025 (10/14/2025, 17:00:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network.

AI-Powered Analysis

AILast updated: 10/14/2025, 17:36:08 UTC

Technical Analysis

CVE-2025-59280 is a vulnerability classified under CWE-287 (Improper Authentication) affecting the Microsoft Windows 10 Version 1809 SMB Client (build 10.0.17763.0). The flaw allows an unauthorized attacker to perform tampering over a network by exploiting weaknesses in the SMB client's authentication mechanism. Specifically, the vulnerability arises because the SMB client does not properly authenticate certain network communications, enabling an attacker to interfere with or modify SMB traffic. However, exploitation requires user interaction and has a high attack complexity, meaning it is not trivial to exploit remotely without some user involvement. The vulnerability impacts the integrity of data transmitted over SMB but does not affect confidentiality or availability. The CVSS v3.1 base score is 3.1 (low), with vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N, indicating network attack vector, high complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and low integrity impact. No known exploits are currently reported in the wild, and no official patches have been released as of the published date (October 14, 2025). The vulnerability is specific to Windows 10 Version 1809, which is an older, out-of-support version for many organizations, increasing the risk for those still running legacy systems. The improper authentication could allow attackers to tamper with SMB communications, potentially leading to unauthorized modification of data or commands within SMB sessions.

Potential Impact

For European organizations, the primary impact of CVE-2025-59280 lies in the potential tampering of SMB network communications, which could undermine data integrity within internal networks or between trusted partners. Although the vulnerability does not compromise confidentiality or availability, the ability to alter SMB traffic could facilitate further attacks such as man-in-the-middle, data manipulation, or unauthorized command execution in SMB sessions. Organizations in sectors relying heavily on SMB for file sharing and network communication—such as manufacturing, finance, healthcare, and government—may face operational risks if legacy Windows 10 1809 systems remain in use. The requirement for user interaction and high attack complexity reduces the likelihood of widespread exploitation, but targeted attacks against high-value assets remain a concern. Additionally, the lack of patches increases exposure time. European entities with strict data integrity requirements and compliance obligations (e.g., GDPR) must consider the risk of tampering as a potential compliance issue. Overall, the impact is limited but non-negligible for environments with legacy SMB clients and sensitive data flows.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a supported, patched Windows version to eliminate the vulnerability entirely. 2. Restrict SMB client access on networks by implementing network segmentation and firewall rules that limit SMB traffic to trusted hosts only. 3. Disable SMBv1 and enforce SMB signing and encryption where possible to enhance authentication and data integrity. 4. Monitor network traffic for unusual SMB activity or signs of tampering using intrusion detection systems (IDS) and endpoint detection and response (EDR) tools. 5. Educate users to avoid interacting with suspicious SMB prompts or network shares that could trigger exploitation. 6. Apply strict access controls and least privilege principles on SMB shares and services. 7. Maintain up-to-date asset inventories to identify and remediate legacy systems still running Windows 10 1809. 8. Prepare incident response plans that include detection and containment strategies for SMB-related tampering attempts. 9. Collaborate with vendors and security communities to track patch releases and threat intelligence related to this vulnerability. 10. Consider network-level mitigations such as SMB proxying or filtering to detect and block malformed or unauthorized SMB traffic.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858f3dd1bfb0b7e41d92

Added to database: 10/14/2025, 5:17:03 PM

Last enriched: 10/14/2025, 5:36:08 PM

Last updated: 10/15/2025, 7:05:19 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats