Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58719: CWE-416: Use After Free in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-58719cvecve-2025-58719cwe-416
Published: Tue Oct 14 2025 (10/14/2025, 17:00:25 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:42:38 UTC

Technical Analysis

CVE-2025-58719 is a use-after-free vulnerability identified in the Connected Devices Platform Service (Cdpsvc) component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior such as crashes or code execution. In this case, an authorized attacker with low privileges on the local system can exploit this flaw to elevate their privileges, potentially gaining higher-level access. The vulnerability does not require user interaction but does require local access, and the attack complexity is high, indicating that exploitation is non-trivial. The vulnerability affects availability primarily, as the CVSS vector indicates no impact on confidentiality or integrity. The Connected Devices Platform Service manages device connectivity and synchronization features, making it a critical system service. No patches or exploit code are currently publicly available, and no known exploits have been detected in the wild. The vulnerability was reserved in early September 2025 and published in mid-October 2025. Given the nature of the vulnerability, attackers could leverage it to disrupt system stability or gain elevated privileges to perform further malicious actions if combined with other vulnerabilities or misconfigurations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to system availability and local privilege integrity. Organizations relying heavily on Windows 11 Version 25H2 in environments where multiple users have local access—such as shared workstations, development environments, or terminal servers—may face increased risk of privilege escalation attacks. While confidentiality and data integrity are not directly impacted, the ability to elevate privileges can lead to further exploitation, lateral movement, or disruption of critical services. Critical infrastructure sectors (energy, finance, healthcare) that use Windows 11 extensively could see operational impacts if attackers exploit this vulnerability to disrupt services or gain unauthorized control. The medium severity rating suggests that while the vulnerability is not trivial to exploit, it should not be ignored, especially in high-security environments. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available for Windows 11 Version 25H2. 2. Restrict local access to systems running the affected Windows version to trusted personnel only, minimizing the risk of local exploitation. 3. Employ application whitelisting and endpoint protection solutions that can detect anomalous behavior related to privilege escalation attempts. 4. Use least privilege principles to limit user permissions, reducing the impact of potential exploitation. 5. Regularly audit and monitor logs for unusual activity related to the Connected Devices Platform Service or privilege escalation attempts. 6. Consider isolating critical systems or using virtualization/containerization to limit the blast radius of a potential exploit. 7. Educate system administrators and users about the risks of local privilege escalation vulnerabilities and the importance of timely patching. 8. Implement robust incident response plans to quickly detect and respond to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.256Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85883dd1bfb0b7e3f8d7

Added to database: 10/14/2025, 5:16:56 PM

Last enriched: 11/27/2025, 3:42:38 AM

Last updated: 12/1/2025, 12:13:18 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats