Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59517: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59517cvecve-2025-59517cwe-284
Published: Tue Dec 09 2025 (12/09/2025, 17:55:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:46:52 UTC

Technical Analysis

CVE-2025-59517 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the Windows Storage VSP Driver in Microsoft Windows 10 Version 1809 (build 17763.0). The flaw arises from insufficient access control checks within the driver, allowing an authorized local attacker to escalate their privileges to SYSTEM level. This means an attacker who already has some level of access on the machine can exploit this vulnerability to gain full administrative control, compromising the confidentiality, integrity, and availability of the system. The vulnerability does not require user interaction and has a CVSS 3.1 base score of 7.8, indicating high severity. The attack vector is local, and the attacker must have low privileges (PR:L) but no UI interaction is needed. The vulnerability scope is unchanged (S:U), meaning the impact is confined to the vulnerable component and does not extend beyond the local system. No public exploits are known at this time, but the vulnerability's nature suggests it could be leveraged in targeted attacks or combined with other exploits to achieve full system compromise. The lack of a patch link indicates that a fix may be pending or in development. Organizations using Windows 10 Version 1809 should prioritize mitigation once patches are available and consider interim controls to limit local access and monitor for privilege escalation attempts.

Potential Impact

For European organizations, this vulnerability presents a significant risk, particularly for those still operating legacy Windows 10 Version 1809 systems. Successful exploitation allows attackers to gain SYSTEM-level privileges, potentially leading to full system compromise, data theft, disruption of services, or deployment of ransomware and other malware. Critical sectors such as finance, healthcare, government, and industrial control systems could face severe operational and reputational damage. The local attack vector means that internal threat actors or attackers who have gained initial footholds through phishing or other means could leverage this vulnerability to escalate privileges and move laterally within networks. The high impact on confidentiality, integrity, and availability underscores the importance of rapid mitigation. Additionally, compliance with European data protection regulations (e.g., GDPR) could be jeopardized if this vulnerability is exploited to access or exfiltrate personal data.

Mitigation Recommendations

1. Apply official Microsoft patches immediately once they become available to address CVE-2025-59517. 2. Until patches are released, restrict local access to systems running Windows 10 Version 1809 by enforcing strict user account controls and limiting administrative privileges. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious privilege escalation attempts. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or rights that could be exploited. 5. Monitor system logs and security event data for unusual activities indicative of privilege escalation, such as unexpected driver interactions or process creations with elevated rights. 6. Consider upgrading affected systems to a supported and patched Windows version to reduce exposure to legacy vulnerabilities. 7. Educate internal users about the risks of local privilege escalation and enforce strong authentication and access policies to reduce the likelihood of initial compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.549Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e174ebaa3babaf6f3c

Added to database: 12/9/2025, 6:18:09 PM

Last enriched: 1/8/2026, 12:46:52 AM

Last updated: 2/5/2026, 11:37:26 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats