Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62567: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-62567cvecve-2025-62567cwe-191
Published: Tue Dec 09 2025 (12/09/2025, 17:56:03 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer underflow (wrap or wraparound) in Windows Hyper-V allows an authorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:57:11 UTC

Technical Analysis

CVE-2025-62567 is a medium-severity integer underflow vulnerability classified under CWE-191, affecting Microsoft Windows 10 Version 1809, specifically in the Hyper-V virtualization component. The vulnerability stems from improper handling of integer values within Hyper-V, leading to an underflow condition where integer values wrap around unexpectedly. This flaw can be triggered by an authorized attacker with low privileges over a network, causing a denial of service (DoS) by disrupting Hyper-V operations, potentially crashing or destabilizing virtual machines or the host hypervisor service. The CVSS v3.1 score of 5.3 reflects a network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). The vulnerability does not require user interaction and is exploitable remotely but demands specific conditions and privileges, which limits widespread exploitation. No known exploits have been reported in the wild, and no patches are currently available, indicating the need for proactive mitigation. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, a version still in use in some enterprise environments despite being out of mainstream support. The lack of patch links suggests that Microsoft has not yet released an official fix, emphasizing the importance of alternative risk reduction strategies. The integer underflow can cause wraparound errors in memory or resource management within Hyper-V, leading to service crashes or denial of service conditions that impact availability but do not compromise data confidentiality or integrity.

Potential Impact

For European organizations, the primary impact of CVE-2025-62567 is the potential for denial of service attacks against Hyper-V virtualization hosts running Windows 10 Version 1809. This can disrupt critical virtualized workloads, including servers, applications, and infrastructure services, leading to operational downtime and potential business continuity issues. Organizations relying on Hyper-V for cloud services, internal virtualization, or hosting critical applications may experience service interruptions. Although the vulnerability does not allow data theft or modification, availability loss can affect productivity, customer service, and compliance with service level agreements. Given that Windows 10 Version 1809 is an older release, some organizations may still use it in legacy environments, increasing their exposure. The requirement for low privileges and network access means that insider threats or compromised internal systems could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known. European sectors such as finance, healthcare, manufacturing, and government, which often use virtualization extensively, could be particularly impacted if mitigation is not applied.

Mitigation Recommendations

1. Upgrade affected systems to a supported and patched version of Windows, preferably the latest Windows 10 or Windows 11 releases, as Windows 10 Version 1809 is out of mainstream support and unlikely to receive patches. 2. Restrict network access to Hyper-V management interfaces and related services using network segmentation, firewalls, and access control lists to limit exposure to authorized personnel only. 3. Implement strict privilege management to ensure that only trusted users have low-level privileges that could be leveraged to exploit this vulnerability. 4. Monitor Hyper-V host systems for unusual crashes, service restarts, or performance degradation that could indicate exploitation attempts. 5. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous Hyper-V network traffic or known attack patterns once available. 6. Consider isolating legacy Windows 10 Version 1809 Hyper-V hosts from critical production environments until they can be upgraded or patched. 7. Maintain up-to-date backups of virtual machines and host configurations to enable rapid recovery in case of denial of service incidents. 8. Stay informed on Microsoft advisories for any forthcoming patches or mitigations related to this CVE.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.221Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e974ebaa3babafb6ef

Added to database: 12/9/2025, 6:18:17 PM

Last enriched: 1/8/2026, 12:57:11 AM

Last updated: 2/7/2026, 11:02:26 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats