Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59290: CWE-416: Use After Free in Microsoft Windows 10 Version 21H2

0
High
VulnerabilityCVE-2025-59290cvecve-2025-59290cwe-416
Published: Tue Oct 14 2025 (10/14/2025, 17:00:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 21H2

Description

Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:03:07 UTC

Technical Analysis

CVE-2025-59290 is a use-after-free vulnerability (CWE-416) discovered in the Windows Bluetooth Service component of Microsoft Windows 10 Version 21H2 (build 10.0.19044.0). The flaw arises when the service improperly manages memory, leading to a scenario where freed memory is accessed again, potentially allowing an attacker to execute arbitrary code or corrupt memory. Exploitation requires the attacker to have authorized local access to the system but does not require user interaction, making it a potent vector for privilege escalation. The vulnerability affects confidentiality, integrity, and availability by enabling attackers to elevate privileges from a lower-level user to SYSTEM or equivalent, potentially gaining full control over the affected machine. The CVSS v3.1 base score is 7.8, reflecting high severity with low attack complexity and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially in environments where local access is possible. The lack of an available patch at the time of publication necessitates immediate mitigation efforts to reduce exposure. This vulnerability highlights the risks inherent in memory management flaws within critical system services such as Bluetooth, which is widely used and enabled by default on many devices.

Potential Impact

The impact of CVE-2025-59290 is substantial for organizations worldwide, particularly those relying on Windows 10 Version 21H2. Successful exploitation allows local attackers to escalate privileges, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of services, and the ability to deploy persistent malware or ransomware. Enterprises with large numbers of Windows 10 endpoints, especially those with users who have local access but limited privileges, face increased risk. The vulnerability could be leveraged in targeted attacks against high-value systems or in insider threat scenarios. Additionally, compromised systems could serve as footholds for lateral movement within corporate networks, amplifying the threat. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation, as exploit development is likely given the vulnerability’s characteristics.

Mitigation Recommendations

Until an official patch is released by Microsoft, organizations should implement specific mitigations to reduce risk. These include restricting local user access to trusted personnel only, enforcing strict access controls and least privilege principles, and disabling the Bluetooth service on systems where it is not required. Monitoring local system logs and behavior for unusual activity related to the Bluetooth service can help detect exploitation attempts. Employing application whitelisting and endpoint detection and response (EDR) solutions can provide additional layers of defense. Once a patch becomes available, organizations must prioritize its deployment across all affected systems. Additionally, educating users about the risks of local privilege escalation and maintaining robust physical security controls to prevent unauthorized local access are critical complementary measures.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.690Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85903dd1bfb0b7e42396

Added to database: 10/14/2025, 5:17:04 PM

Last enriched: 2/28/2026, 2:03:07 PM

Last updated: 3/21/2026, 3:15:10 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses