Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25181: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-25181cvecve-2026-25181cwe-125
Published: Tue Mar 10 2026 (03/10/2026, 17:04:57 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:21:48 UTC

Technical Analysis

CVE-2026-25181 is an out-of-bounds read vulnerability classified under CWE-125, affecting the Windows Graphics Device Interface Plus (GDI+) component in Microsoft Windows 10 Version 1607 (build 10.0.14393.0). GDI+ is responsible for rendering graphics and images, and this vulnerability occurs due to improper bounds checking when processing certain graphical data. An attacker can exploit this flaw remotely over a network without any authentication or user interaction, allowing them to read memory beyond the allocated buffer. This can lead to disclosure of sensitive information residing in adjacent memory areas, potentially leaking confidential data such as cryptographic keys, credentials, or other sensitive process memory contents. The vulnerability does not allow modification of data or disruption of service, focusing solely on confidentiality breach. The CVSS 3.1 base score is 7.5, indicating a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), with high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). As of the published date, no known exploits have been observed in the wild, and no official patches or mitigations have been released by Microsoft. This vulnerability primarily affects legacy systems still running Windows 10 Version 1607, which has been out of mainstream support for several years, increasing the risk for organizations that have not upgraded. The vulnerability's exploitation could be embedded in maliciously crafted graphical content delivered over the network, such as images or documents processed by GDI+. Given the nature of the vulnerability, attackers could leverage it for reconnaissance or to gain sensitive information that could facilitate further attacks.

Potential Impact

The primary impact of CVE-2026-25181 is unauthorized disclosure of sensitive information, which can compromise confidentiality within affected systems. Organizations running Windows 10 Version 1607 are at risk of data leakage that could include credentials, encryption keys, or other sensitive memory contents. This information disclosure can aid attackers in escalating privileges, bypassing security controls, or conducting further targeted attacks. Since the vulnerability does not affect integrity or availability, it does not directly enable system takeover or denial of service. However, the ease of remote exploitation without authentication or user interaction increases the threat level, especially in environments where legacy Windows 10 systems are exposed to untrusted networks. The lack of patches or mitigations at the time of disclosure means organizations must rely on compensating controls, increasing operational risk. Industries with sensitive data such as finance, healthcare, government, and critical infrastructure could face significant consequences if attackers leverage this vulnerability to extract confidential information. Additionally, the presence of legacy systems in many enterprises worldwide extends the potential attack surface, making this a relevant threat for global organizations that have not fully migrated to supported Windows versions.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later to eliminate the vulnerability. 2. Until patches are available, restrict network exposure of Windows 10 Version 1607 systems by implementing strict firewall rules and network segmentation to limit access to trusted users and systems only. 3. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous or malicious graphical data processing attempts targeting GDI+. 4. Disable or restrict processing of untrusted graphical content in applications that rely on GDI+ where feasible, including blocking or sandboxing suspicious image formats or documents. 5. Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, such as unexpected memory access patterns or crashes related to GDI+. 6. Educate users and administrators about the risks of opening untrusted files or links that may contain malicious graphical content. 7. Apply application whitelisting and endpoint protection solutions capable of detecting exploitation techniques targeting memory corruption vulnerabilities. 8. Maintain an inventory of systems running legacy Windows versions and prioritize their upgrade or isolation from critical networks. 9. Follow Microsoft security advisories closely for the release of official patches or workarounds and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-29T18:36:49.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562dea502d3aa87d6a41

Added to database: 3/10/2026, 5:34:37 PM

Last enriched: 3/10/2026, 6:21:48 PM

Last updated: 3/14/2026, 2:36:36 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses