CVE-2025-60720: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-60720 is a buffer over-read vulnerability classified under CWE-126 found in the Windows TDX.sys driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises due to improper bounds checking within the TDX.sys driver, which leads to reading memory beyond the intended buffer boundaries. This flaw can be exploited by an attacker who already has authorized local access to the system to elevate their privileges. The attack does not require user interaction and can compromise the confidentiality, integrity, and availability of the affected system by allowing unauthorized access to sensitive kernel memory or execution of arbitrary code with elevated privileges. The CVSS 3.1 base score is 7.8, indicating a high severity level, with attack vector local, low attack complexity, and requiring privileges but no user interaction. Although no known exploits are currently in the wild, the vulnerability is critical for environments where Windows 10 Version 1809 is still in use, particularly because this version is no longer the latest and may not receive regular updates. The vulnerability was published on November 11, 2025, and no patches have been linked yet, emphasizing the need for vigilance and proactive mitigation. The TDX.sys driver is related to Intel Trust Domain Extensions, which are used for hardware-based security features, making this vulnerability particularly sensitive as it could undermine trusted execution environments.
Potential Impact
For European organizations, the impact of CVE-2025-60720 can be significant, especially in sectors relying on legacy Windows 10 Version 1809 systems such as government agencies, healthcare, finance, and critical infrastructure. Successful exploitation allows an attacker with local access to escalate privileges, potentially gaining full system control, bypassing security controls, and accessing sensitive data. This can lead to data breaches, disruption of services, and compromise of system integrity. The vulnerability affects confidentiality by exposing kernel memory, integrity by enabling unauthorized code execution, and availability by potentially causing system crashes or denial of service. Since the attack requires local access, insider threats or attackers who have already compromised lower-privilege accounts pose the greatest risk. The lack of public exploits currently reduces immediate risk but also means organizations must be proactive before exploitation becomes widespread. The use of this older Windows version in some European enterprises and public sector organizations increases the scope of affected systems.
Mitigation Recommendations
1. Apply security patches from Microsoft immediately once they become available for Windows 10 Version 1809 systems. 2. If patches are not yet available, restrict local access to affected systems by enforcing strict access controls and monitoring privileged account usage. 3. Employ endpoint detection and response (EDR) solutions to detect anomalous local privilege escalation attempts. 4. Consider upgrading affected systems to a supported and fully patched Windows version to reduce exposure to legacy vulnerabilities. 5. Implement application whitelisting and least privilege principles to limit the impact of potential exploits. 6. Conduct regular security audits and vulnerability assessments focusing on legacy Windows deployments. 7. Educate internal users about the risks of privilege escalation and insider threats. 8. Monitor logs for unusual activity related to TDX.sys or kernel driver interactions. 9. Isolate critical systems using network segmentation to limit lateral movement if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60720: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Description
Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-60720 is a buffer over-read vulnerability classified under CWE-126 found in the Windows TDX.sys driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises due to improper bounds checking within the TDX.sys driver, which leads to reading memory beyond the intended buffer boundaries. This flaw can be exploited by an attacker who already has authorized local access to the system to elevate their privileges. The attack does not require user interaction and can compromise the confidentiality, integrity, and availability of the affected system by allowing unauthorized access to sensitive kernel memory or execution of arbitrary code with elevated privileges. The CVSS 3.1 base score is 7.8, indicating a high severity level, with attack vector local, low attack complexity, and requiring privileges but no user interaction. Although no known exploits are currently in the wild, the vulnerability is critical for environments where Windows 10 Version 1809 is still in use, particularly because this version is no longer the latest and may not receive regular updates. The vulnerability was published on November 11, 2025, and no patches have been linked yet, emphasizing the need for vigilance and proactive mitigation. The TDX.sys driver is related to Intel Trust Domain Extensions, which are used for hardware-based security features, making this vulnerability particularly sensitive as it could undermine trusted execution environments.
Potential Impact
For European organizations, the impact of CVE-2025-60720 can be significant, especially in sectors relying on legacy Windows 10 Version 1809 systems such as government agencies, healthcare, finance, and critical infrastructure. Successful exploitation allows an attacker with local access to escalate privileges, potentially gaining full system control, bypassing security controls, and accessing sensitive data. This can lead to data breaches, disruption of services, and compromise of system integrity. The vulnerability affects confidentiality by exposing kernel memory, integrity by enabling unauthorized code execution, and availability by potentially causing system crashes or denial of service. Since the attack requires local access, insider threats or attackers who have already compromised lower-privilege accounts pose the greatest risk. The lack of public exploits currently reduces immediate risk but also means organizations must be proactive before exploitation becomes widespread. The use of this older Windows version in some European enterprises and public sector organizations increases the scope of affected systems.
Mitigation Recommendations
1. Apply security patches from Microsoft immediately once they become available for Windows 10 Version 1809 systems. 2. If patches are not yet available, restrict local access to affected systems by enforcing strict access controls and monitoring privileged account usage. 3. Employ endpoint detection and response (EDR) solutions to detect anomalous local privilege escalation attempts. 4. Consider upgrading affected systems to a supported and fully patched Windows version to reduce exposure to legacy vulnerabilities. 5. Implement application whitelisting and least privilege principles to limit the impact of potential exploits. 6. Conduct regular security audits and vulnerability assessments focusing on legacy Windows deployments. 7. Educate internal users about the risks of privilege escalation and insider threats. 8. Monitor logs for unusual activity related to TDX.sys or kernel driver interactions. 9. Isolate critical systems using network segmentation to limit lateral movement if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-26T05:03:24.537Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69137c4a47ab3590319da0fa
Added to database: 11/11/2025, 6:11:22 PM
Last enriched: 1/2/2026, 11:14:50 PM
Last updated: 1/7/2026, 8:47:24 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.