Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59191: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59191cvecve-2025-59191cwe-122
Published: Tue Oct 14 2025 (10/14/2025, 17:01:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/27/2025, 02:54:49 UTC

Technical Analysis

CVE-2025-59191 is a heap-based buffer overflow vulnerability identified in the Connected Devices Platform Service (Cdpsvc) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability is classified under CWE-122, indicating improper handling of memory buffers leading to overflow conditions. The flaw allows an attacker with authorized local access to the system to execute a privilege escalation attack by exploiting the buffer overflow in Cdpsvc. The attacker does not require user interaction to exploit this vulnerability, and the attack complexity is low, meaning it can be reliably exploited under normal conditions. Successful exploitation results in full compromise of confidentiality, integrity, and availability of the affected system, as the attacker can gain elevated privileges and potentially execute arbitrary code with SYSTEM-level permissions. The vulnerability was published on October 14, 2025, with no known exploits in the wild and no patches currently available. The lack of patches increases the urgency for organizations to implement mitigating controls. The vulnerability affects a specific legacy Windows 10 version, which remains in use in many enterprise environments due to extended support or compatibility requirements. The CVSS v3.1 base score of 7.8 reflects a high severity rating, driven by local attack vector, low attack complexity, required privileges, and high impact on confidentiality, integrity, and availability. The Connected Devices Platform Service is a core Windows service responsible for device connectivity features, making this vulnerability critical for systems relying on this service.

Potential Impact

For European organizations, the impact of CVE-2025-59191 is significant, especially for those still operating Windows 10 Version 1809 in their environments. Successful exploitation can lead to unauthorized privilege escalation, allowing attackers to bypass security controls, access sensitive data, and disrupt critical services. This can affect confidentiality by exposing sensitive information, integrity by allowing unauthorized modifications, and availability by enabling denial-of-service conditions or persistent malware installation. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and the potential for operational disruption. The local attack vector means that insider threats or attackers who gain initial foothold through other means (e.g., phishing, physical access) can leverage this vulnerability to escalate privileges and move laterally within networks. The absence of known exploits currently provides a window for proactive defense, but the lack of patches means organizations must rely on compensating controls. Legacy systems in European enterprises, especially those with strict regulatory requirements like GDPR, face compliance risks if this vulnerability is exploited.

Mitigation Recommendations

1. Restrict local access to systems running Windows 10 Version 1809, limiting user privileges and enforcing strict access controls to reduce the risk of local exploitation. 2. Implement application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities related to Cdpsvc or privilege escalation attempts. 3. Disable or restrict the Connected Devices Platform Service (Cdpsvc) if it is not essential for business operations, reducing the attack surface. 4. Conduct thorough audits to identify all systems running the affected Windows 10 version and prioritize them for upgrade or replacement with supported versions that include security patches. 5. Apply any available Microsoft workarounds or security advisories as they become available, and monitor official channels for patch releases. 6. Enhance network segmentation to limit lateral movement opportunities for attackers who gain local access. 7. Train IT staff and users to recognize and report suspicious activity that could indicate exploitation attempts. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. These steps go beyond generic advice by focusing on service-specific controls, system inventory, and proactive network defense tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e401b4

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 11/27/2025, 2:54:49 AM

Last updated: 12/3/2025, 2:57:20 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats