Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59513: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-59513cvecve-2025-59513cwe-125
Published: Tue Nov 11 2025 (11/11/2025, 17:59:19 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:18:09 UTC

Technical Analysis

CVE-2025-59513 is a security vulnerability classified under CWE-125 (Out-of-bounds Read) found in the Windows Bluetooth RFCOM Protocol Driver on Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises when the driver improperly handles memory boundaries, allowing an authorized local attacker to read memory locations outside the intended buffer. Exploiting this flaw does not require user interaction but does require the attacker to have local privileges on the affected system. The vulnerability primarily compromises confidentiality by enabling unauthorized disclosure of sensitive information residing in memory. The CVSS 3.1 base score of 5.5 reflects a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), and privileges required (PR:L). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). No public exploits or active exploitation in the wild have been reported to date. The vulnerability was reserved in September 2025 and published in November 2025, but no patches or mitigations have been linked yet. This flaw affects legacy Windows 10 systems, which may still be in use in some enterprise environments, particularly those with Bluetooth-dependent applications or devices. Attackers with local access could leverage this vulnerability to extract sensitive data from memory, potentially leading to further attacks or data leakage.

Potential Impact

For European organizations, the primary impact of CVE-2025-59513 is the potential unauthorized disclosure of sensitive information on systems running Windows 10 Version 1809. This could include corporate data, credentials, or other confidential information stored in memory. Since the vulnerability requires local privileges, the risk is higher in environments where multiple users share systems or where attackers can gain initial access through other means. The lack of impact on integrity and availability means the vulnerability does not directly cause system disruption or data modification but can facilitate espionage or lateral movement within networks. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on legacy Windows 10 systems and Bluetooth connectivity may face increased risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. Failure to address this vulnerability could lead to data breaches, regulatory non-compliance, and reputational damage.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 Version 1809 systems as soon as Microsoft releases a security update addressing CVE-2025-59513. 2. Until patches are available, restrict local user access to systems running this Windows version, especially limiting accounts with Bluetooth usage privileges. 3. Disable or limit Bluetooth functionality on affected systems if not required, reducing the attack surface. 4. Implement strict access controls and monitoring on endpoints to detect unusual local activity or attempts to access the Bluetooth RFCOM driver. 5. Employ endpoint detection and response (EDR) tools to identify suspicious memory access patterns indicative of exploitation attempts. 6. Conduct regular audits of legacy systems to identify and remediate outdated software versions. 7. Educate IT staff and users about the risks of local privilege escalation and information disclosure vulnerabilities. 8. Consider network segmentation to isolate legacy systems from critical infrastructure and sensitive data repositories. These steps go beyond generic advice by focusing on controlling local access, Bluetooth usage, and proactive monitoring tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.549Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4847ab3590319da08e

Added to database: 11/11/2025, 6:11:20 PM

Last enriched: 11/18/2025, 7:18:09 PM

Last updated: 11/21/2025, 12:55:40 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats