Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47976: CWE-416: Use After Free in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-47976cvecve-2025-47976cwe-416
Published: Tue Jul 08 2025 (07/08/2025, 16:57:04 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:06:28 UTC

Technical Analysis

CVE-2025-47976 is a use-after-free vulnerability classified under CWE-416 found in the Windows Simple Service Discovery Protocol (SSDP) Service on Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw arises when the SSDP service improperly handles memory, leading to a use-after-free condition that can be exploited by an attacker with authorized local access to execute arbitrary code with elevated privileges. This vulnerability does not require user interaction and has a low attack complexity, meaning an attacker with standard user privileges can leverage it to gain higher system privileges, potentially SYSTEM level. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to execute malicious code, modify system files, or disrupt service availability. While no public exploits have been reported yet, the vulnerability's nature and high CVSS score (7.8) indicate a significant risk, especially on legacy systems that are no longer receiving mainstream support or security updates. The SSDP service is a network discovery protocol component, and its exploitation could facilitate lateral movement or persistence within compromised environments. The vulnerability was reserved in May 2025 and published in July 2025, with no patches currently linked, emphasizing the urgency for mitigation through system upgrades or vendor advisories.

Potential Impact

For European organizations, the impact of CVE-2025-47976 is substantial, particularly for those still operating legacy Windows 10 Version 1507 systems. Successful exploitation can lead to local privilege escalation, enabling attackers to gain administrative control over affected machines. This can result in unauthorized access to sensitive data, disruption of critical services, and the potential for attackers to establish persistent footholds within enterprise networks. Sectors such as government, healthcare, finance, and critical infrastructure are especially vulnerable due to the sensitive nature of their data and the potential for widespread operational disruption. The vulnerability's exploitation could facilitate further attacks, including ransomware deployment or espionage activities. Given the lack of known exploits in the wild, the threat is currently theoretical but could rapidly escalate if proof-of-concept code or exploit tools become available. The risk is amplified in environments where legacy systems are interconnected with modern infrastructure, potentially allowing attackers to pivot and compromise broader network segments.

Mitigation Recommendations

To mitigate CVE-2025-47976, European organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version, as this legacy build no longer receives security updates. If immediate upgrade is not feasible, organizations should consider disabling the SSDP service where it is not required, as this reduces the attack surface. Implement strict local access controls and limit user privileges to the minimum necessary to reduce the risk of local exploitation. Employ endpoint detection and response (EDR) solutions to monitor for suspicious activity related to privilege escalation attempts. Network segmentation can help contain potential compromises originating from vulnerable hosts. Regularly audit and inventory legacy systems to identify and remediate unsupported software. Stay informed on vendor advisories for any forthcoming patches or workarounds. Additionally, enforce strong physical security controls to prevent unauthorized local access, as exploitation requires local authentication.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d36f40f0eb72f91afe

Added to database: 7/8/2025, 5:09:39 PM

Last enriched: 2/14/2026, 10:06:28 AM

Last updated: 3/21/2026, 4:16:49 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses