Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25168: CWE-476: NULL Pointer Dereference in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2026-25168cvecve-2026-25168cwe-476
Published: Tue Mar 10 2026 (03/10/2026, 17:04:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:35:04 UTC

Technical Analysis

CVE-2026-25168 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting the Microsoft Graphics Component in Windows 10 Version 1607 (build 10.0.14393.0). This flaw occurs when the software improperly handles a NULL pointer, leading to a crash or system instability when the affected code path is executed. An unauthorized attacker with local access can exploit this vulnerability to cause a denial of service by triggering the NULL pointer dereference, crashing the graphics component or the entire system. The vulnerability does not require any privileges or user interaction, which lowers the barrier for exploitation if local access is obtained. However, the attack vector is limited to local access, meaning remote exploitation is not feasible. The CVSS v3.1 base score is 6.2, reflecting a medium severity primarily due to the impact on availability and ease of exploitation without privileges. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The affected Windows 10 version 1607 is an older release, which may still be in use in certain legacy or industrial environments. The vulnerability highlights the importance of proper pointer validation in system components to prevent crashes and denial of service conditions.

Potential Impact

The primary impact of CVE-2026-25168 is denial of service through system crashes caused by the NULL pointer dereference in the graphics component. This can lead to instability or forced reboots, disrupting normal operations and potentially causing data loss if unsaved work is interrupted. Organizations relying on Windows 10 Version 1607, particularly in environments where system availability is critical (e.g., industrial control systems, legacy enterprise systems), may face operational disruptions. Since exploitation requires local access, the threat is more relevant in scenarios where attackers have physical or remote desktop access to affected machines. The vulnerability does not compromise confidentiality or integrity, so data breaches or unauthorized data modification are not direct concerns. However, repeated denial of service could be used as part of a larger attack strategy to degrade system reliability or distract defenders. The lack of available patches increases risk until remediation is applied or systems are upgraded.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1607 is outdated and no longer supported with security updates. 2. If upgrading is not immediately possible, restrict local access to affected systems by enforcing strict physical security and limiting user permissions to trusted personnel only. 3. Monitor systems for unexpected crashes or restarts related to graphics components to detect potential exploitation attempts. 4. Apply any future patches or hotfixes released by Microsoft promptly once available. 5. Employ application whitelisting and endpoint protection solutions to reduce the risk of unauthorized local code execution that could trigger the vulnerability. 6. Educate users and administrators about the risks of running unsupported OS versions and the importance of timely updates. 7. For critical environments, consider isolating legacy systems from general network access to minimize exposure to local attackers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-29T18:36:49.695Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562cea502d3aa87d69e4

Added to database: 3/10/2026, 5:34:36 PM

Last enriched: 3/10/2026, 6:35:04 PM

Last updated: 3/12/2026, 10:30:22 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses