CVE-2026-25169: CWE-369: Divide By Zero in Microsoft Windows 10 Version 1607
Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.
AI Analysis
Technical Summary
CVE-2026-25169 is a vulnerability identified in the Microsoft Graphics Component of Windows 10 Version 1607 (build 10.0.14393.0). The root cause is a divide-by-zero error (CWE-369), which occurs when the software attempts to perform a division operation with a zero divisor, leading to an unhandled exception. This flaw can be triggered by an unauthorized attacker with local access, causing the affected component or the entire system to crash, resulting in a denial of service (DoS). The vulnerability does not require any privileges or user interaction, making it easier to exploit locally. The CVSS v3.1 base score is 6.2, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning local attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits have been reported in the wild, and no official patches have been linked yet, though Microsoft is likely to address it in future updates. The vulnerability specifically affects an older Windows 10 version, which is less common in modern environments but still present in legacy systems. The divide-by-zero error in a graphics component suggests that certain graphics processing or rendering operations could trigger the crash, potentially impacting user sessions or services relying on graphics processing. This vulnerability highlights the importance of maintaining updated systems and restricting local access to trusted users.
Potential Impact
The primary impact of CVE-2026-25169 is denial of service, which can disrupt availability of affected Windows 10 Version 1607 systems. Organizations running legacy Windows 10 builds in critical environments may experience system crashes, leading to downtime, loss of productivity, and potential disruption of services dependent on the affected machines. Since the vulnerability requires local access, the risk is higher in environments where multiple users share systems or where attackers can gain local footholds, such as through compromised credentials or physical access. Although confidentiality and integrity are not directly impacted, repeated crashes could lead to operational instability and increased support costs. The lack of known exploits reduces immediate risk, but the medium severity score and ease of exploitation without privileges or user interaction mean that attackers with local access could leverage this vulnerability for targeted disruption. Organizations relying on legacy Windows 10 versions in sectors like manufacturing, healthcare, or government may face increased operational risks if this vulnerability is exploited.
Mitigation Recommendations
1. Upgrade affected systems to a newer, supported Windows 10 version or later Windows releases where this vulnerability is not present. 2. Apply any forthcoming security patches from Microsoft promptly once available. 3. Restrict local access to systems running Windows 10 Version 1607 to trusted and authorized personnel only, minimizing the risk of local exploitation. 4. Implement strict access controls and monitoring on shared or multi-user systems to detect and prevent unauthorized local activity. 5. Use application whitelisting and endpoint protection solutions to detect anomalous behavior that might indicate exploitation attempts. 6. Educate users about the risks of local privilege escalation and the importance of physical security to prevent unauthorized access. 7. For critical environments where upgrade is not immediately feasible, consider isolating affected systems from untrusted networks and users to reduce attack surface. 8. Regularly review and audit system logs for signs of crashes or unusual activity related to graphics processing components.
Affected Countries
United States, China, India, Russia, Germany, United Kingdom, Brazil, France, Japan, South Korea
CVE-2026-25169: CWE-369: Divide By Zero in Microsoft Windows 10 Version 1607
Description
Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.
AI-Powered Analysis
Technical Analysis
CVE-2026-25169 is a vulnerability identified in the Microsoft Graphics Component of Windows 10 Version 1607 (build 10.0.14393.0). The root cause is a divide-by-zero error (CWE-369), which occurs when the software attempts to perform a division operation with a zero divisor, leading to an unhandled exception. This flaw can be triggered by an unauthorized attacker with local access, causing the affected component or the entire system to crash, resulting in a denial of service (DoS). The vulnerability does not require any privileges or user interaction, making it easier to exploit locally. The CVSS v3.1 base score is 6.2, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning local attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits have been reported in the wild, and no official patches have been linked yet, though Microsoft is likely to address it in future updates. The vulnerability specifically affects an older Windows 10 version, which is less common in modern environments but still present in legacy systems. The divide-by-zero error in a graphics component suggests that certain graphics processing or rendering operations could trigger the crash, potentially impacting user sessions or services relying on graphics processing. This vulnerability highlights the importance of maintaining updated systems and restricting local access to trusted users.
Potential Impact
The primary impact of CVE-2026-25169 is denial of service, which can disrupt availability of affected Windows 10 Version 1607 systems. Organizations running legacy Windows 10 builds in critical environments may experience system crashes, leading to downtime, loss of productivity, and potential disruption of services dependent on the affected machines. Since the vulnerability requires local access, the risk is higher in environments where multiple users share systems or where attackers can gain local footholds, such as through compromised credentials or physical access. Although confidentiality and integrity are not directly impacted, repeated crashes could lead to operational instability and increased support costs. The lack of known exploits reduces immediate risk, but the medium severity score and ease of exploitation without privileges or user interaction mean that attackers with local access could leverage this vulnerability for targeted disruption. Organizations relying on legacy Windows 10 versions in sectors like manufacturing, healthcare, or government may face increased operational risks if this vulnerability is exploited.
Mitigation Recommendations
1. Upgrade affected systems to a newer, supported Windows 10 version or later Windows releases where this vulnerability is not present. 2. Apply any forthcoming security patches from Microsoft promptly once available. 3. Restrict local access to systems running Windows 10 Version 1607 to trusted and authorized personnel only, minimizing the risk of local exploitation. 4. Implement strict access controls and monitoring on shared or multi-user systems to detect and prevent unauthorized local activity. 5. Use application whitelisting and endpoint protection solutions to detect anomalous behavior that might indicate exploitation attempts. 6. Educate users about the risks of local privilege escalation and the importance of physical security to prevent unauthorized access. 7. For critical environments where upgrade is not immediately feasible, consider isolating affected systems from untrusted networks and users to reduce attack surface. 8. Regularly review and audit system logs for signs of crashes or unusual activity related to graphics processing components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2026-01-29T18:36:49.695Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b0562cea502d3aa87d69e9
Added to database: 3/10/2026, 5:34:36 PM
Last enriched: 3/10/2026, 6:34:44 PM
Last updated: 3/13/2026, 9:25:10 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.