Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60703: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-60703cvecve-2025-60703cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:20 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:18:47 UTC

Technical Analysis

CVE-2025-60703 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Windows 10 Version 1809 (build 17763.0). The flaw resides in the Windows Remote Desktop component, where improper handling of pointers allows an authorized local attacker to dereference untrusted pointers. This can lead to elevation of privileges locally, enabling the attacker to execute code with higher privileges than initially granted. The vulnerability does not require user interaction and has a low attack complexity, but the attacker must have some level of local privileges (PR:L). The scope is unchanged, meaning the vulnerability affects only the local system context. The impact on confidentiality, integrity, and availability is high, as successful exploitation can compromise the entire system. Although no exploits are currently known in the wild, the vulnerability's nature and severity make it a significant risk. The absence of a patch link suggests that remediation is pending or in progress. The vulnerability was reserved in late September 2025 and published in November 2025, indicating recent discovery. This vulnerability is particularly concerning for environments where Windows 10 1809 remains operational, especially if Remote Desktop is enabled and local user access is not tightly controlled.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors relying heavily on Windows 10 Version 1809 with Remote Desktop enabled, such as government, finance, healthcare, and critical infrastructure. An attacker with authorized local access could escalate privileges to system-level, potentially leading to full system compromise, data breaches, and disruption of services. The high impact on confidentiality, integrity, and availability could result in exposure of sensitive data, unauthorized system modifications, and denial of service. Since the vulnerability requires local privileges, insider threats or compromised accounts pose a particular risk. Organizations with legacy systems or delayed patching cycles are more vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the potential for future exploitation remains high. This vulnerability could also facilitate lateral movement within networks if attackers gain initial footholds on affected machines.

Mitigation Recommendations

European organizations should immediately inventory their Windows 10 systems to identify those running Version 1809 (build 17763.0) and assess Remote Desktop usage. Restrict local user access to trusted personnel only, employing strict access controls and monitoring for unusual local privilege escalations. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious activities related to pointer dereferencing or privilege escalation attempts. Since no patch link is currently available, organizations should monitor Microsoft security advisories closely and apply patches promptly once released. In the interim, consider disabling Remote Desktop on vulnerable systems if feasible or restricting it via network-level controls and multi-factor authentication to reduce attack surface. Conduct user awareness training to mitigate insider threats and enforce the principle of least privilege. Regularly review and update system configurations and security policies to minimize exposure. Additionally, maintain robust backup and recovery procedures to mitigate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.534Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4847ab3590319da097

Added to database: 11/11/2025, 6:11:20 PM

Last enriched: 11/18/2025, 7:18:47 PM

Last updated: 11/21/2025, 12:55:44 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats