Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59294: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1507

0
Low
VulnerabilityCVE-2025-59294cvecve-2025-59294cwe-200
Published: Tue Oct 14 2025 (10/14/2025, 17:00:51 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 21:20:58 UTC

Technical Analysis

CVE-2025-59294 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the Windows Taskbar Live feature, which can inadvertently disclose sensitive information to an attacker who has physical access to the device. The vulnerability does not require authentication but does require user interaction, indicating that the attacker must be physically present and interact with the system to exploit the flaw. The CVSS 3.1 base score is 2.1, reflecting low severity primarily due to the attack vector being physical (AV:P), low impact on confidentiality (C:L), and no impact on integrity or availability. The vulnerability does not have any known exploits in the wild, and no patches have been published as of the date provided. The exposure could involve information displayed or accessible via the Taskbar Live feature, potentially leaking sensitive data to unauthorized individuals. Since this affects an early version of Windows 10 (1507), which is largely out of support, the risk is mitigated by the limited deployment of this version in modern environments. However, legacy systems still running this build remain vulnerable to physical attack scenarios.

Potential Impact

The primary impact of CVE-2025-59294 is the unauthorized disclosure of sensitive information, which could lead to privacy violations or leakage of confidential data. Since the attack requires physical access and user interaction, the scope is limited to environments where attackers can physically approach the device, such as public or shared workstations, kiosks, or poorly secured offices. There is no impact on system integrity or availability, so the threat does not enable system compromise or denial of service. Organizations with legacy Windows 10 Version 1507 systems in sensitive environments could face risks of data leakage, potentially aiding further social engineering or targeted attacks. However, the overall impact is low due to the limited attack vector and the obsolescence of the affected Windows version. The lack of known exploits and patches reduces immediate risk but also highlights the need for proactive mitigation.

Mitigation Recommendations

1. Upgrade all systems running Windows 10 Version 1507 to a supported and patched version of Windows 10 or later to eliminate the vulnerability entirely. 2. Enforce strict physical security controls to prevent unauthorized physical access to devices, especially in public or shared environments. 3. Disable or restrict the use of Windows Taskbar Live features if upgrading is not immediately possible, to reduce exposure. 4. Implement user session locking policies and automatic screen locks to minimize the window of opportunity for physical attackers. 5. Conduct regular audits of legacy systems to identify and remediate unsupported software versions. 6. Educate users about the risks of physical access attacks and encourage vigilance in securing their devices. 7. Monitor for any emerging exploits or patches related to this vulnerability and apply updates promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85903dd1bfb0b7e4239f

Added to database: 10/14/2025, 5:17:04 PM

Last enriched: 2/22/2026, 9:20:58 PM

Last updated: 3/26/2026, 8:50:32 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses