Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58719: CWE-416: Use After Free in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-58719cvecve-2025-58719cwe-416
Published: Tue Oct 14 2025 (10/14/2025, 17:00:25 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:35:05 UTC

Technical Analysis

CVE-2025-58719 is a use-after-free vulnerability classified under CWE-416, found in the Connected Devices Platform Service (Cdpsvc) component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior such as crashes or arbitrary code execution. In this case, the vulnerability allows an authorized local attacker with low privileges to elevate their privileges by exploiting improper memory management in Cdpsvc. The attack vector requires local access but no user interaction, and the attack complexity is high, indicating that exploitation is non-trivial. The vulnerability impacts system availability but does not compromise confidentiality or integrity directly. Although no known exploits are currently in the wild, the vulnerability poses a risk of privilege escalation, which could be leveraged for further attacks. The vulnerability was reserved on September 3, 2025, and published on October 14, 2025. No patches have been linked yet, but Microsoft is expected to release updates to address this issue. The CVSS v3.1 score is 4.7 (medium severity), reflecting the limited scope and complexity of exploitation. The vulnerability affects Windows 11 Version 25H2, a widely deployed operating system in enterprise environments.

Potential Impact

For European organizations, this vulnerability presents a risk of local privilege escalation on systems running Windows 11 Version 25H2. Attackers who gain low-level access—such as through compromised user accounts or insider threats—could exploit this flaw to gain higher privileges, potentially allowing them to disable security controls, install persistent malware, or disrupt system availability. This could impact critical infrastructure, government agencies, and enterprises relying on Windows 11 for daily operations. Although the vulnerability does not directly affect confidentiality or integrity, the elevation of privileges can be a stepping stone for more severe attacks. The medium severity rating and high attack complexity reduce the likelihood of widespread exploitation, but targeted attacks against high-value assets remain a concern. The lack of known exploits in the wild currently limits immediate risk, but organizations should remain vigilant. The impact on availability could cause service disruptions, affecting business continuity and operational resilience.

Mitigation Recommendations

Organizations should prioritize deploying official patches from Microsoft once available to remediate this vulnerability. Until patches are released, restrict local access to systems running Windows 11 Version 25H2 to trusted personnel only, minimizing the risk of local exploitation. Implement strict user account controls and monitor for unusual privilege escalation attempts or suspicious activity related to the Connected Devices Platform Service. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block exploitation attempts. Regularly audit and harden local user permissions to reduce the attack surface. Additionally, consider isolating critical systems and enforcing network segmentation to limit lateral movement if an attacker gains local access. Maintain up-to-date backups and incident response plans to quickly recover from potential availability impacts. Finally, educate IT staff about this vulnerability and the importance of timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.256Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85883dd1bfb0b7e3f8d7

Added to database: 10/14/2025, 5:16:56 PM

Last enriched: 1/2/2026, 10:35:05 PM

Last updated: 1/19/2026, 12:12:37 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats