Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62462: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-62462cvecve-2025-62462cwe-126
Published: Tue Dec 09 2025 (12/09/2025, 17:55:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Buffer over-read in Windows Projected File System allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:24:26 UTC

Technical Analysis

CVE-2025-62462 is a buffer over-read vulnerability classified under CWE-126 affecting the Windows Projected File System (ProjFS) in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises when the ProjFS component improperly handles memory boundaries, allowing an attacker with authorized local access to read beyond allocated buffers. This can lead to disclosure of sensitive information, corruption of memory, and ultimately privilege escalation by enabling the attacker to execute code with elevated permissions. The attack vector is local, requiring the attacker to have some level of access (low privileges) but does not require user interaction, increasing the risk in environments where multiple users share systems or where local accounts are not tightly controlled. The vulnerability affects confidentiality, integrity, and availability, as it can be leveraged to compromise system security comprehensively. Although no exploits have been observed in the wild, the lack of an official patch at the time of publication means systems remain vulnerable. The CVSS v3.1 base score of 7.8 reflects the high impact on system security with relatively low attack complexity and privileges required. The vulnerability is particularly concerning for enterprise and government environments that rely on Windows 10 1809, which remains in use in many organizations despite newer Windows versions being available. The absence of patch links suggests that mitigation relies on workarounds and access control until Microsoft releases an update.

Potential Impact

The potential impact of CVE-2025-62462 is significant for organizations worldwide, especially those still operating Windows 10 Version 1809. Successful exploitation allows an attacker with local access to escalate privileges, potentially gaining SYSTEM-level control. This can lead to full system compromise, unauthorized access to sensitive data, disruption of services, and the ability to deploy further malware or ransomware. The vulnerability threatens confidentiality by enabling unauthorized memory reads, integrity by allowing code execution with elevated privileges, and availability by potentially causing system instability or denial of service. Organizations with shared workstations, weak local account controls, or those that allow untrusted users local access are at higher risk. The lack of known exploits in the wild currently reduces immediate risk but also means attackers may develop exploits rapidly once details are public. The impact is heightened in sectors with high-value targets such as government, finance, healthcare, and critical infrastructure, where privilege escalation can facilitate lateral movement and data exfiltration.

Mitigation Recommendations

To mitigate CVE-2025-62462 effectively, organizations should: 1) Restrict local access to Windows 10 Version 1809 systems by enforcing strict user account controls and limiting the number of users with local login privileges. 2) Implement application whitelisting and endpoint detection to monitor and block suspicious activities indicative of privilege escalation attempts. 3) Use least privilege principles to minimize the rights of local users and service accounts. 4) Monitor system logs for unusual memory access patterns or privilege escalation indicators. 5) Prepare to deploy Microsoft’s official patch immediately upon release and test it in controlled environments before wide deployment. 6) Consider upgrading affected systems to a newer, supported Windows version where this vulnerability is not present. 7) Employ network segmentation to isolate critical systems and reduce the risk of lateral movement if a local compromise occurs. 8) Educate administrators and users about the risks of local privilege escalation vulnerabilities and enforce strong endpoint security policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-14T18:24:58.484Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e374ebaa3babaf6fe7

Added to database: 12/9/2025, 6:18:11 PM

Last enriched: 3/1/2026, 12:24:26 AM

Last updated: 3/24/2026, 2:56:20 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses