Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60708: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-60708cvecve-2025-60708cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:24 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Untrusted pointer dereference in Storvsp.sys Driver allows an authorized attacker to deny service locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:20:05 UTC

Technical Analysis

CVE-2025-60708 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in the Storvsp.sys driver component of Microsoft Windows 10 Version 1809 (build 17763.0). The flaw arises when the driver dereferences a pointer that can be influenced by an authorized local attacker, leading to improper memory access. This can cause the driver or the entire system to crash, resulting in a denial of service (DoS) condition. The vulnerability requires the attacker to have local privileges (PR:L) but does not require user interaction (UI:N). The attack complexity is low (AC:L), meaning an attacker with local access can reliably trigger the issue without special conditions. The vulnerability does not compromise confidentiality or integrity but impacts availability (A:H). The scope is changed (S:C), indicating that the vulnerability affects components beyond the vulnerable driver, potentially causing system-wide impact. No known exploits have been reported in the wild, and no official patches have been linked yet, though the vulnerability was published on November 11, 2025. The Storvsp.sys driver is part of the Windows storage virtualization stack, and its failure can disrupt critical storage operations, causing system instability or crashes. This vulnerability is relevant for environments still running the older Windows 10 Version 1809, which may be present in legacy systems or specialized industrial setups.

Potential Impact

For European organizations, the primary impact of CVE-2025-60708 is the potential for local denial of service on systems running Windows 10 Version 1809. This could disrupt business operations by causing system crashes or reboots, especially in environments relying on legacy systems that have not been updated. Critical infrastructure or industrial control systems using this Windows version may experience operational interruptions. Although the vulnerability does not allow data theft or modification, the loss of availability can affect service continuity, leading to downtime and potential financial losses. Organizations with strict uptime requirements or those in sectors such as manufacturing, healthcare, or finance could face operational risks. Additionally, the need for local access means that insider threats or compromised user accounts could exploit this vulnerability to disrupt systems. The absence of known exploits reduces immediate risk, but the medium severity rating and potential for system crashes warrant proactive mitigation.

Mitigation Recommendations

Organizations should prioritize upgrading systems from Windows 10 Version 1809 to a more recent and supported Windows version where this vulnerability is not present. Until patches are available, restrict local access to affected systems by enforcing strict access controls and monitoring for suspicious local activity. Employ application whitelisting and endpoint protection solutions to detect and prevent attempts to exploit the vulnerability. Regularly audit and minimize the number of users with local privileges to reduce the attack surface. For critical systems that must remain on Version 1809, consider isolating them from general user environments and implementing robust monitoring to detect abnormal system crashes or driver failures. Stay informed through Microsoft security advisories for the release of official patches and apply them promptly once available. Additionally, conduct regular backups to ensure rapid recovery in case of system disruption caused by exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.535Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4947ab3590319da0b6

Added to database: 11/11/2025, 6:11:21 PM

Last enriched: 11/18/2025, 7:20:05 PM

Last updated: 11/20/2025, 9:44:18 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats