Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59191: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59191cvecve-2025-59191cwe-122
Published: Tue Oct 14 2025 (10/14/2025, 17:01:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:41:40 UTC

Technical Analysis

CVE-2025-59191 is a heap-based buffer overflow vulnerability classified under CWE-122, found in the Connected Devices Platform Service (Cdpsvc) component of Microsoft Windows 10 Version 1809 (build 17763.0). This vulnerability allows an attacker with local authorized access to execute a privilege escalation attack by exploiting improper handling of heap memory buffers. The flaw can lead to arbitrary code execution in the context of the affected service, enabling the attacker to gain elevated privileges, potentially SYSTEM-level, thereby compromising the confidentiality, integrity, and availability of the affected system. Exploitation does not require user interaction but does require the attacker to have legitimate local access with low complexity. The vulnerability was published on October 14, 2025, with no known exploits in the wild at the time of disclosure. The CVSS v3.1 base score is 7.8, reflecting high severity due to the impact on all three security properties and the relatively low attack complexity. The Connected Devices Platform Service is responsible for managing device connectivity features, and its compromise could allow attackers to bypass security controls and execute malicious payloads with elevated privileges. No official patches were linked at the time of publication, indicating that organizations must monitor for updates and apply them promptly once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those still operating legacy Windows 10 Version 1809 systems in enterprise environments. Successful exploitation can lead to full system compromise, allowing attackers to access sensitive data, disrupt operations, or move laterally within networks. Critical infrastructure sectors such as finance, healthcare, and government agencies are particularly vulnerable due to the potential for privilege escalation to SYSTEM level, enabling attackers to disable security controls or deploy ransomware. The requirement for local access limits remote exploitation but does not eliminate risk in environments where insider threats or compromised endpoints exist. The absence of known exploits currently reduces immediate risk, but the high severity score and potential impact necessitate proactive mitigation. Organizations relying on legacy Windows 10 systems must prioritize remediation to prevent exploitation that could lead to data breaches, operational downtime, and regulatory non-compliance under GDPR.

Mitigation Recommendations

1. Immediately inventory and identify all systems running Windows 10 Version 1809 (build 17763.0) within the organization. 2. Restrict local access to critical systems by enforcing strict access controls and monitoring for unauthorized logins. 3. Apply principle of least privilege to user accounts to minimize the risk of privilege escalation. 4. Monitor security advisories from Microsoft closely and apply official patches or security updates as soon as they become available. 5. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts targeting Cdpsvc. 6. Conduct regular vulnerability scans and penetration tests focusing on privilege escalation vectors. 7. Educate IT staff and users about the risks of local privilege escalation and the importance of reporting suspicious activity. 8. Consider upgrading affected systems to a supported and patched Windows version to eliminate exposure to legacy vulnerabilities. 9. Implement application whitelisting and restrict execution of unauthorized code to reduce exploitation surface. 10. Maintain robust backup and recovery procedures to mitigate impact in case of successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e401b4

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 1/2/2026, 10:41:40 PM

Last updated: 1/17/2026, 12:29:15 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats