Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59517: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59517cvecve-2025-59517cwe-284
Published: Tue Dec 09 2025 (12/09/2025, 17:55:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 12/09/2025, 18:38:22 UTC

Technical Analysis

CVE-2025-59517 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the Windows Storage VSP Driver in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an authorized local attacker to elevate privileges on the affected system. Specifically, the improper access control in the driver permits escalation from a lower-privileged user context to higher privileges, potentially SYSTEM level, without requiring user interaction. The CVSS v3.1 score is 7.8, reflecting high severity with metrics AV:L (Local), AC:L (Low complexity), PR:L (Low privileges required), UI:N (No user interaction), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known yet, the vulnerability poses a significant risk because it enables attackers who have already gained local access to increase their control over the system, facilitating further malicious activities such as installing persistent malware, accessing sensitive data, or disrupting system operations. The vulnerability was reserved in September 2025 and published in December 2025, but no patches are currently linked, indicating organizations must monitor for updates. The affected product is Windows 10 Version 1809, a widely deployed enterprise OS version, especially in legacy environments. The vulnerability's exploitation requires local access but no user interaction, making it a potent vector for insider threats or attackers who have compromised user accounts with limited privileges.

Potential Impact

For European organizations, the impact of CVE-2025-59517 is significant due to the widespread use of Windows 10 Version 1809 in enterprise and government environments. Successful exploitation can lead to full system compromise by elevating privileges, allowing attackers to bypass security controls, access confidential information, and disrupt critical services. This is particularly concerning for sectors such as finance, healthcare, energy, and public administration, where data confidentiality and system availability are paramount. The vulnerability could facilitate lateral movement within networks, enabling attackers to escalate privileges on multiple systems and potentially compromise entire organizational infrastructures. Given the lack of required user interaction and low complexity, insider threats or attackers with initial footholds can leverage this vulnerability to deepen their access. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure. European organizations with legacy systems or delayed patching practices are at higher risk. The vulnerability also poses compliance risks under GDPR if exploited to access personal data.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 Version 1809 systems as soon as Microsoft releases a security update addressing CVE-2025-59517. 2. Implement strict local access controls and limit administrative privileges to reduce the pool of users who can exploit this vulnerability. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts and suspicious activity related to the Windows Storage VSP Driver. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or rights that could be leveraged by attackers. 5. Use application whitelisting and device control policies to prevent unauthorized code execution and driver loading. 6. Segment networks to restrict lateral movement opportunities if an attacker gains local access. 7. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and the importance of timely patching. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 9. Consider upgrading to a more recent Windows 10 version or Windows 11 where this vulnerability is not present or has been fixed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.549Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e174ebaa3babaf6f3c

Added to database: 12/9/2025, 6:18:09 PM

Last enriched: 12/9/2025, 6:38:22 PM

Last updated: 12/10/2025, 9:30:28 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats