Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59280: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1507

0
Low
VulnerabilityCVE-2025-59280cvecve-2025-59280cwe-287
Published: Tue Oct 14 2025 (10/14/2025, 17:00:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:02:32 UTC

Technical Analysis

CVE-2025-59280 is a security vulnerability identified in the Server Message Block (SMB) client implementation of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability is classified as CWE-287, indicating improper authentication. Specifically, the SMB client fails to properly authenticate certain network communications, which allows an unauthorized attacker to perform tampering over the network. This tampering could involve modifying or injecting malicious data into SMB sessions, potentially disrupting operations or enabling further attacks. The vulnerability requires user interaction, such as connecting to a malicious SMB server, and has a high attack complexity, meaning exploitation is not straightforward. The CVSS v3.1 base score is 3.1 (low severity), reflecting no impact on confidentiality or availability, only limited integrity impact, and no privileges required. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability affects only the initial release version of Windows 10, which is largely out of mainstream support, limiting its scope. However, legacy systems still running this version remain vulnerable. The root cause lies in insufficient authentication checks in the SMB client protocol handling, allowing attackers to bypass expected authentication mechanisms under specific conditions.

Potential Impact

The impact of CVE-2025-59280 is relatively limited due to its low severity score and the requirement for user interaction and high attack complexity. Successful exploitation could allow an attacker to tamper with SMB communications, potentially altering data integrity during file sharing or network resource access. This could disrupt business operations or enable secondary attacks that rely on manipulated SMB traffic. However, the vulnerability does not allow unauthorized disclosure of information or denial of service, nor does it grant elevated privileges. Organizations running Windows 10 Version 1507, especially in legacy or isolated environments, face the highest risk. Since this version is outdated, most modern enterprise environments are unlikely to be affected. Nonetheless, environments with legacy systems or specialized equipment running this version could experience operational disruptions or data integrity issues if targeted. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed to prevent future exploitation.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1507 is out of mainstream support and lacks security updates. 2. Restrict SMB client network access through firewall rules, limiting connections to trusted SMB servers only. 3. Disable SMB client functionality on systems where it is not required to reduce the attack surface. 4. Implement network segmentation to isolate legacy systems running Windows 10 Version 1507 from critical infrastructure and sensitive data stores. 5. Monitor network traffic for unusual SMB connection attempts or tampering indicators using intrusion detection systems (IDS) or endpoint detection and response (EDR) tools. 6. Educate users to avoid connecting to untrusted SMB shares or servers, as exploitation requires user interaction. 7. Stay alert for official patches or security advisories from Microsoft and apply them promptly once available. 8. Consider deploying SMB signing and encryption where possible to enhance SMB communication security and reduce tampering risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858f3dd1bfb0b7e41d92

Added to database: 10/14/2025, 5:17:03 PM

Last enriched: 2/28/2026, 2:02:32 PM

Last updated: 3/26/2026, 7:59:45 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses