Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59280: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1809

0
Low
VulnerabilityCVE-2025-59280cvecve-2025-59280cwe-287
Published: Tue Oct 14 2025 (10/14/2025, 17:00:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:07:00 UTC

Technical Analysis

CVE-2025-59280 is a vulnerability categorized under CWE-287 (Improper Authentication) affecting the Microsoft Windows 10 Version 1809 SMB Client (build 10.0.17763.0). The flaw allows an unauthorized attacker to tamper with network communications by exploiting improper authentication mechanisms within the SMB client protocol. Specifically, the vulnerability enables an attacker with network access to interfere with SMB sessions, potentially modifying data or commands exchanged between the client and SMB servers. The CVSS v3.1 base score is 3.1, indicating a low severity due to several factors: the attack vector is network-based (AV:N), but the attack complexity is high (AC:H), no privileges are required (PR:N), and user interaction is necessary (UI:R). The scope remains unchanged (S:U), and the impact is limited to integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact. The exploitability is rated as unofficial (E:U), and the report confidence is confirmed (RC:C). No known exploits are currently in the wild, and no patches have been published yet. This vulnerability primarily affects environments where Windows 10 Version 1809 SMB clients communicate over the network, potentially allowing attackers to tamper with SMB traffic, which could lead to unauthorized modification of files or commands during transmission. Given the SMB protocol's widespread use for file sharing and network resource access, this vulnerability could be leveraged in targeted attacks against organizations relying on legacy Windows 10 versions.

Potential Impact

For European organizations, the impact of CVE-2025-59280 is primarily related to the integrity of network communications involving SMB file sharing. Organizations using Windows 10 Version 1809 in their environments, especially those with SMB clients communicating over untrusted or semi-trusted networks, could face risks of data tampering or unauthorized modification of SMB traffic. This could disrupt business operations that depend on accurate file transfers or network resource access. Although the vulnerability does not affect confidentiality or availability, tampering could lead to corrupted files, unauthorized changes to shared data, or potential downstream effects on applications relying on SMB data integrity. Sectors such as finance, manufacturing, healthcare, and government agencies in Europe that still operate legacy Windows 10 versions and rely on SMB for internal file sharing are at higher risk. The low severity and high attack complexity reduce the likelihood of widespread exploitation, but targeted attacks against critical infrastructure or sensitive data environments remain a concern. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

Given the lack of an official patch at this time, European organizations should implement specific mitigations to reduce exposure to CVE-2025-59280. First, restrict SMB client network access by limiting SMB traffic to trusted internal networks only, using network segmentation and firewall rules to block SMB connections from untrusted or external sources. Second, monitor SMB traffic for anomalies or unexpected tampering attempts using network intrusion detection systems (NIDS) or endpoint detection and response (EDR) tools capable of inspecting SMB protocol behavior. Third, enforce strict authentication policies and consider disabling SMBv1 and enforcing SMB signing where possible to enhance authentication integrity. Fourth, prioritize upgrading affected systems from Windows 10 Version 1809 to supported, patched Windows versions that do not contain this vulnerability. Additionally, educate users to be cautious with network interactions that may trigger SMB connections requiring user interaction, as exploitation requires user involvement. Finally, maintain up-to-date asset inventories to identify and track systems running the vulnerable Windows version to prioritize remediation efforts once patches become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858f3dd1bfb0b7e41d92

Added to database: 10/14/2025, 5:17:03 PM

Last enriched: 11/27/2025, 3:07:00 AM

Last updated: 12/3/2025, 12:52:42 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats