Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25169: CWE-369: Divide By Zero in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2026-25169cvecve-2026-25169cwe-369
Published: Tue Mar 10 2026 (03/10/2026, 17:04:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:34:44 UTC

Technical Analysis

CVE-2026-25169 is a vulnerability identified in the Microsoft Graphics Component of Windows 10 Version 1607 (build 10.0.14393.0). The root cause is a divide-by-zero error (CWE-369), which occurs when the software attempts to perform a division operation with a zero divisor, leading to an unhandled exception. This flaw can be triggered by an unauthorized attacker with local access, causing the affected component or the entire system to crash, resulting in a denial of service (DoS). The vulnerability does not require any privileges or user interaction, making it easier to exploit locally. The CVSS v3.1 base score is 6.2, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning local attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits have been reported in the wild, and no official patches have been linked yet, though Microsoft is likely to address it in future updates. The vulnerability specifically affects an older Windows 10 version, which is less common in modern environments but still present in legacy systems. The divide-by-zero error in a graphics component suggests that certain graphics processing or rendering operations could trigger the crash, potentially impacting user sessions or services relying on graphics processing. This vulnerability highlights the importance of maintaining updated systems and restricting local access to trusted users.

Potential Impact

The primary impact of CVE-2026-25169 is denial of service, which can disrupt availability of affected Windows 10 Version 1607 systems. Organizations running legacy Windows 10 builds in critical environments may experience system crashes, leading to downtime, loss of productivity, and potential disruption of services dependent on the affected machines. Since the vulnerability requires local access, the risk is higher in environments where multiple users share systems or where attackers can gain local footholds, such as through compromised credentials or physical access. Although confidentiality and integrity are not directly impacted, repeated crashes could lead to operational instability and increased support costs. The lack of known exploits reduces immediate risk, but the medium severity score and ease of exploitation without privileges or user interaction mean that attackers with local access could leverage this vulnerability for targeted disruption. Organizations relying on legacy Windows 10 versions in sectors like manufacturing, healthcare, or government may face increased operational risks if this vulnerability is exploited.

Mitigation Recommendations

1. Upgrade affected systems to a newer, supported Windows 10 version or later Windows releases where this vulnerability is not present. 2. Apply any forthcoming security patches from Microsoft promptly once available. 3. Restrict local access to systems running Windows 10 Version 1607 to trusted and authorized personnel only, minimizing the risk of local exploitation. 4. Implement strict access controls and monitoring on shared or multi-user systems to detect and prevent unauthorized local activity. 5. Use application whitelisting and endpoint protection solutions to detect anomalous behavior that might indicate exploitation attempts. 6. Educate users about the risks of local privilege escalation and the importance of physical security to prevent unauthorized access. 7. For critical environments where upgrade is not immediately feasible, consider isolating affected systems from untrusted networks and users to reduce attack surface. 8. Regularly review and audit system logs for signs of crashes or unusual activity related to graphics processing components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-29T18:36:49.695Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562cea502d3aa87d69e9

Added to database: 3/10/2026, 5:34:36 PM

Last enriched: 3/10/2026, 6:34:44 PM

Last updated: 3/13/2026, 9:25:10 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses