Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59195: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows 11 Version 25H2

0
High
VulnerabilityCVE-2025-59195cvecve-2025-59195cwe-362cwe-416
Published: Tue Oct 14 2025 (10/14/2025, 17:00:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:42:41 UTC

Technical Analysis

CVE-2025-59195 is a race condition vulnerability classified under CWE-362, found in the Microsoft Graphics Component of Windows 11 Version 25H2 (build 10.0.26200.0). The flaw arises from improper synchronization when multiple threads or processes concurrently access shared resources within the graphics subsystem. This concurrency issue can lead to inconsistent states or resource conflicts, enabling an authorized local attacker with low privileges to trigger a denial of service (DoS) condition. The attacker does not require user interaction, but the attack complexity is high due to the need to precisely time concurrent operations. The vulnerability affects confidentiality, integrity, and availability, as it may cause system crashes or instability, potentially disrupting critical services relying on graphics processing. Although no public exploits are known, the high CVSS score of 7.0 reflects the significant impact if exploited. The vulnerability is currently unpatched, and Microsoft has not released mitigation updates. The flaw is particularly concerning for environments where Windows 11 25H2 is deployed extensively, especially in enterprise settings with graphics-intensive applications or multi-user systems. The race condition could be exploited by malicious insiders or compromised local accounts to degrade system reliability or cause service interruptions.

Potential Impact

For European organizations, this vulnerability poses a risk of local denial of service attacks that can disrupt business operations, especially in sectors relying on Windows 11 25H2 for critical graphics workloads such as design, media, and engineering. The potential for system crashes or instability can lead to downtime, loss of productivity, and increased operational costs. Confidentiality and integrity impacts, while less direct, arise from the possibility of corrupted graphics data or system states. Organizations with multi-user environments or shared workstations are more vulnerable to exploitation by low-privileged insiders or malware that gains local access. The absence of known exploits reduces immediate risk but does not eliminate the threat, particularly as attackers may develop exploits over time. The high attack complexity somewhat limits widespread exploitation, but targeted attacks against high-value European enterprises remain a concern. This vulnerability could also affect public sector and critical infrastructure entities that use Windows 11 25H2, potentially impacting service availability and trust.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement interim mitigations such as restricting local access to trusted users only and enforcing strict privilege management to minimize the number of accounts with local access. Monitoring systems for unusual graphics subsystem behavior or crashes can provide early detection of exploitation attempts. Organizations should prepare for rapid deployment of patches once Microsoft releases updates by maintaining robust patch management processes. Employing application whitelisting and endpoint detection and response (EDR) solutions can help detect and prevent exploitation attempts. Additionally, isolating critical systems and limiting concurrent access to shared graphics resources can reduce the likelihood of triggering the race condition. Security teams should also educate users about the risks of local privilege escalation and enforce policies to prevent unauthorized software execution. Finally, maintaining up-to-date backups ensures recovery capability in case of denial of service or system instability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e4054c

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 1/2/2026, 10:42:41 PM

Last updated: 1/19/2026, 10:04:43 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats