Skip to main content

CVE-2025-47975: CWE-415: Double Free in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-47975cvecve-2025-47975cwe-415
Published: Tue Jul 08 2025 (07/08/2025, 16:57:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Double free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 08/26/2025, 00:45:48 UTC

Technical Analysis

CVE-2025-47975 is a high-severity vulnerability identified as a double free flaw (CWE-415) in the Windows SSDP (Simple Service Discovery Protocol) Service on Microsoft Windows 10 Version 1809 (build 10.0.17763.0). A double free vulnerability occurs when a program attempts to free a region of memory twice, which can lead to memory corruption, crashes, or arbitrary code execution. In this case, the flaw allows an authorized local attacker with limited privileges (PR:L) to exploit the vulnerability to elevate their privileges on the affected system. The vulnerability does not require user interaction (UI:N) but has a high attack complexity (AC:H), meaning exploitation requires specific conditions or knowledge. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation could lead to full system compromise. The vulnerability is currently not known to be exploited in the wild, and no patches or mitigations have been publicly released yet. The SSDP service is part of the Windows networking stack, used for device discovery and network communication, which is enabled by default on many Windows installations, especially in enterprise environments. Since the attacker must have some level of local access, this vulnerability is primarily a local privilege escalation vector that could be chained with other vulnerabilities or used by malicious insiders or malware that has gained limited access to the system. Given the affected version is Windows 10 Version 1809, which is an older release, systems that have not been updated or are running legacy software may be vulnerable. The vulnerability was reserved in May 2025 and published in July 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where legacy Windows 10 Version 1809 systems remain in use. The ability for an attacker with limited local privileges to escalate to full administrative rights can lead to complete system compromise, data breaches, and disruption of critical services. This is particularly concerning for sectors with sensitive data such as finance, healthcare, and government institutions. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate sensitive information, modify or destroy data, and disrupt operations. Additionally, the vulnerability could be leveraged by ransomware or advanced persistent threat (APT) groups to deepen their foothold within networks. Since the SSDP service is network-facing and commonly enabled, the attack surface is broad within affected systems. European organizations with strict regulatory requirements (e.g., GDPR) could face compliance issues and financial penalties if breaches occur due to exploitation of this vulnerability. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score underscores the urgency for remediation.

Mitigation Recommendations

1. Immediate mitigation should focus on identifying and isolating systems running Windows 10 Version 1809, especially those with the SSDP service enabled. 2. Disable the SSDP service on systems where it is not required, as this reduces the attack surface. This can be done via services.msc or PowerShell commands (e.g., Set-Service -Name SSDPSRV -StartupType Disabled). 3. Implement strict local access controls and monitoring to detect unauthorized access attempts, as exploitation requires local privileges. 4. Apply network segmentation to limit lateral movement opportunities if an attacker gains local access. 5. Monitor system logs for unusual behavior related to the SSDP service or memory corruption events. 6. Prepare for patch deployment by tracking vendor updates closely; although no patches are currently available, Microsoft is likely to release a security update. 7. Encourage migration from Windows 10 Version 1809 to supported, updated versions of Windows 10 or Windows 11 to reduce exposure to legacy vulnerabilities. 8. Employ endpoint detection and response (EDR) tools capable of detecting exploitation attempts targeting memory corruption or privilege escalation. 9. Conduct regular security awareness training to reduce the risk of initial local access through phishing or social engineering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d36f40f0eb72f91afb

Added to database: 7/8/2025, 5:09:39 PM

Last enriched: 8/26/2025, 12:45:48 AM

Last updated: 9/18/2025, 3:43:20 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats