Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62467: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-62467cvecve-2025-62467cwe-190cwe-126
Published: Tue Dec 09 2025 (12/09/2025, 17:55:52 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer overflow or wraparound in Windows Projected File System allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:24:51 UTC

Technical Analysis

CVE-2025-62467 is an integer overflow or wraparound vulnerability identified in the Windows Projected File System (ProjFS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises when the system improperly handles integer values, causing them to overflow or wrap around, which can lead to memory corruption or logic errors. This flaw enables an attacker with authorized local access to escalate privileges by manipulating the Projected File System's handling of file system projections. The attacker can exploit this to gain higher privileges than originally granted, potentially achieving SYSTEM-level access. The vulnerability does not require user interaction but does require the attacker to have some level of local privileges (PR:L). The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. No public exploits or patches are currently available, indicating the need for vigilance and proactive defense. The vulnerability is tracked under CWE-190 (Integer Overflow or Wraparound), a common weakness that can lead to serious security issues if exploited. Given the age of Windows 10 Version 1809, many organizations may still have legacy systems vulnerable to this issue, especially in environments where upgrading is delayed due to compatibility or operational constraints.

Potential Impact

The impact of CVE-2025-62467 is significant for organizations running Windows 10 Version 1809, as it allows local attackers to escalate privileges and potentially take full control of affected systems. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, and disruption of system availability. In enterprise environments, such privilege escalation can be a stepping stone for lateral movement, persistence, and deployment of further malware or ransomware. The vulnerability undermines the confidentiality, integrity, and availability of systems, increasing the risk of data breaches and operational disruptions. Organizations with legacy systems, especially those in regulated industries or critical infrastructure sectors, face heightened risk due to the potential for attackers to exploit this vulnerability to bypass security controls. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

To mitigate CVE-2025-62467, organizations should: 1) Prioritize upgrading or patching Windows 10 Version 1809 systems as soon as Microsoft releases an official security update addressing this vulnerability. 2) Restrict local access to systems running this OS version by enforcing strict access controls and limiting administrative privileges to trusted personnel only. 3) Employ application whitelisting and endpoint protection solutions capable of detecting anomalous privilege escalation attempts. 4) Monitor system logs and security events for unusual activity related to the Projected File System or privilege escalations. 5) Consider isolating legacy systems or migrating critical workloads to supported and updated operating system versions to reduce exposure. 6) Implement network segmentation to limit the impact of a compromised system. 7) Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving local privilege escalation. These steps go beyond generic advice by focusing on controlling local access, proactive monitoring, and legacy system management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-14T18:24:58.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e374ebaa3babaf6ff6

Added to database: 12/9/2025, 6:18:11 PM

Last enriched: 3/1/2026, 12:24:51 AM

Last updated: 3/26/2026, 5:23:30 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses