Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60708: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2025-60708cvecve-2025-60708cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:24 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Untrusted pointer dereference in Storvsp.sys Driver allows an authorized attacker to deny service locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 07:19:28 UTC

Technical Analysis

CVE-2025-60708 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in the Storvsp.sys driver component of Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw arises when the driver dereferences pointers that have not been properly validated or sanitized, leading to potential system instability or crashes. An attacker with authorized local access and low privileges can exploit this vulnerability to trigger a denial of service condition by causing the system to crash or become unresponsive. The vulnerability does not require user interaction and has a CVSS 3.1 base score of 6.5, reflecting its medium severity. The attack vector is local, meaning remote exploitation is not feasible without prior access. The vulnerability affects only availability, with no impact on confidentiality or integrity, and the scope is changed (S:C) indicating that the vulnerability can affect resources beyond the vulnerable component. No public exploits or patches are currently available, but the issue has been officially published and reserved by Microsoft. Since Windows 10 Version 1607 is an older release, many organizations may have already migrated to newer versions, limiting the exposure. However, legacy systems still in operation remain vulnerable to potential denial of service attacks that could disrupt business operations or critical services.

Potential Impact

For European organizations, the primary impact of CVE-2025-60708 is the potential for local denial of service attacks on systems running Windows 10 Version 1607. This could lead to unexpected system crashes, service interruptions, and downtime, particularly affecting legacy infrastructure or specialized environments that have not been upgraded. Critical systems relying on this Windows version could experience availability issues, impacting business continuity and operational efficiency. Since the vulnerability requires local access and low privileges, insider threats or compromised user accounts could exploit it to disrupt services. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions can still have significant operational and financial consequences. European sectors with strict uptime requirements, such as healthcare, finance, and manufacturing, may be particularly sensitive to such disruptions. The absence of known exploits in the wild provides some time for mitigation, but organizations should prioritize identifying and upgrading affected systems to reduce risk.

Mitigation Recommendations

To mitigate CVE-2025-60708, European organizations should first identify all systems running Windows 10 Version 1607 (build 10.0.14393.0) using inventory and asset management tools. Since no patches are currently available, the most effective mitigation is to upgrade these systems to a supported and updated version of Windows 10 or later, where this vulnerability is not present. Organizations should also enforce strict access controls to limit local user privileges, reducing the risk of exploitation by unauthorized or low-privilege users. Implementing endpoint protection and monitoring for unusual system crashes or behavior can help detect potential exploitation attempts. Additionally, organizations should prepare incident response plans to quickly recover from denial of service conditions caused by this vulnerability. Regularly checking for Microsoft security advisories and applying patches promptly once released is critical. For environments where upgrading is not immediately feasible, isolating vulnerable systems and restricting local access can reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.535Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4947ab3590319da0b6

Added to database: 11/11/2025, 6:11:21 PM

Last enriched: 2/14/2026, 7:19:28 AM

Last updated: 3/24/2026, 10:12:29 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses