Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59191: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59191cvecve-2025-59191cwe-122
Published: Tue Oct 14 2025 (10/14/2025, 17:01:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 21:09:10 UTC

Technical Analysis

CVE-2025-59191 is a heap-based buffer overflow vulnerability identified in the Connected Devices Platform Service (Cdpsvc) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability is classified under CWE-122, indicating improper handling of memory buffers leading to overflow conditions. An attacker who already has some level of authorized local access with limited privileges can exploit this flaw to execute arbitrary code with elevated privileges, potentially gaining SYSTEM-level control over the affected machine. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), but it does require local access and privileges (PR:L). The CVSS v3.1 base score is 7.8, reflecting high severity due to the impact on confidentiality, integrity, and availability (all rated high). The scope remains unchanged (S:U), meaning the exploit affects only the vulnerable component and not other system components directly. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved on September 10, 2025, and published on October 14, 2025. The Cdpsvc service is responsible for managing connected devices and their interactions, making it a critical service in Windows 10 environments. Exploitation could allow attackers to bypass security controls and gain persistent elevated access, posing significant risks to system security and stability.

Potential Impact

The vulnerability allows an attacker with limited local privileges to escalate their rights to SYSTEM level, which can lead to full control over the affected system. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized modification of system files and settings, and availability by potentially causing system crashes or denial of service. Organizations relying on Windows 10 Version 1809, especially those with legacy systems that have not been updated, face increased risk of internal threats or lateral movement by attackers who have gained initial access. Critical infrastructure, enterprise environments, and government systems using this OS version could suffer severe operational disruptions and data breaches. The lack of a patch and known exploits in the wild means attackers could develop exploits rapidly, increasing the urgency for mitigation. The vulnerability's local attack vector limits remote exploitation but does not eliminate risk in environments where attackers can gain local access through other means, such as phishing or insider threats.

Mitigation Recommendations

1. Restrict access to the Connected Devices Platform Service (Cdpsvc) by limiting which users and processes can interact with it, using Windows security policies and access control lists. 2. Employ the principle of least privilege rigorously to minimize the number of users with local access and administrative rights. 3. Monitor and audit local user activities for unusual behavior indicative of privilege escalation attempts, focusing on interactions with Cdpsvc. 4. Use application whitelisting and endpoint detection and response (EDR) tools to detect and block suspicious code execution patterns related to heap overflows. 5. Isolate legacy Windows 10 Version 1809 systems from critical network segments to reduce the impact of potential compromises. 6. Prepare for patch deployment by tracking Microsoft security advisories closely and testing updates in controlled environments before wide deployment. 7. Consider upgrading affected systems to newer, supported Windows versions where this vulnerability is not present. 8. Implement strong local authentication mechanisms and multi-factor authentication to reduce the risk of unauthorized local access. 9. Employ memory protection features such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to mitigate exploitation success.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e401b4

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 2/22/2026, 9:09:10 PM

Last updated: 3/23/2026, 3:35:01 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses