CVE Alert: CVE-2025-50152 – Microsoft – Windows 10 Version 1809

CVE-2025-50152

HIGHNo exploitation known

Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 11 Version 25H2
Versions
10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.19044.0 lt 10.0.19044.6456 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.19045.0 lt 10.0.19045.6456 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.10240.0 lt 10.0.10240.21161 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.26200.0 lt 10.0.26200.6899
CWE
CWE-125, CWE-125: Out-of-bounds Read
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-10-14T17:00:55.475Z
Updated
2025-10-14T19:38:41.746Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation; exploitation is not confirmed in the wild, but affected systems should be patched promptly.

Why this matters

A kernel-level elevation of privilege with local access could grant an attacker SYSTEM, enabling persistence, credential access, and broad lateral movement within the host. Because there is no user interaction required, an already-compromised account or malware foothold could leverage this to bypass security controls.

Most likely attack path

  • Attack requires local access with low privileges and no user interaction (AV:L, AC:L, UI:N, Scope: U).
  • An attacker with a foothold could trigger kernel code execution to gain SYSTEM rights, then operate with full control of the host.
  • From there, lateral movement or data access is feasible if adjacent systems share trust or credentials.

Who is most exposed

Enterprise endpoints and servers still running affected Windows builds, including 10/11 client versions and Server installations, are at risk until patched. Environments with mixed OS versions and deferred updates are especially vulnerable.

Detection ideas

  • Unusual kernel-mode memory access or crash dumps indicative of out-of-bounds reads.
  • New or renamed processes/services launching under SYSTEM from non-admin contexts.
  • Tokens or privileges being elevated without corresponding administrative actions.
  • Unexpected SYSTEM-level process persistence or service creation post-login.
  • Anomalous patch or driver-loading activity on otherwise stable hosts.

Mitigation and prioritisation

  • Apply the latest security updates for all affected builds; verify via standard patch-management processes.
  • Enforce least privilege, restrict local admin rights, and harden with application control.
  • Enable robust EDR/IDS logging for kernel-mode events; monitor for privilege-escalation indicators and SYSTEM process creation.
  • Validate asset inventory and isolate or segment high-risk hosts until patched.
  • If KEV or EPSS signals become available, elevate to priority accordingly.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.