Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60717: CWE-416: Use After Free in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-60717cvecve-2025-60717cwe-416
Published: Tue Nov 11 2025 (11/11/2025, 17:59:38 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:22:06 UTC

Technical Analysis

CVE-2025-60717 is a use-after-free vulnerability classified under CWE-416 found in the Windows Broadcast DVR User Service component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises when the service improperly manages memory, leading to a scenario where previously freed memory is accessed, potentially allowing an attacker to execute arbitrary code or escalate privileges. The flaw specifically allows an authorized attacker with low privileges on the local machine to elevate their privileges to higher levels without requiring user interaction. The CVSS v3.1 base score is 7.0, indicating high severity, with vector metrics AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access, high complexity, low privileges, no user interaction, unchanged scope, and impacts confidentiality, integrity, and availability at a high level. No public exploits are known yet, and no patches have been released at the time of publication. The vulnerability was reserved in late September 2025 and published in November 2025. The Broadcast DVR User Service is responsible for recording gameplay and broadcasting features, and its compromise could allow attackers to gain SYSTEM-level privileges, potentially leading to full system compromise. The vulnerability is particularly concerning for environments where legacy Windows 10 1809 systems remain in use, as this version is out of mainstream support, increasing exposure risk due to delayed patching.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors relying on legacy Windows 10 1809 systems such as government agencies, critical infrastructure, and enterprises with slow upgrade cycles. Successful exploitation could lead to privilege escalation, allowing attackers to bypass security controls, access sensitive data, deploy malware, or disrupt services. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate data, alter system configurations, or cause denial of service. Since the attack requires local access, insider threats or attackers who have gained initial footholds via other means could leverage this vulnerability to escalate privileges and move laterally within networks. The lack of available patches increases the window of exposure, and organizations that do not upgrade or mitigate risk may face increased chances of targeted attacks. The vulnerability's high complexity and local access requirement somewhat limit widespread exploitation but do not eliminate risk in environments with multiple user accounts or shared systems.

Mitigation Recommendations

European organizations should prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version to eliminate exposure. Until patches are available, organizations should implement strict local access controls, including limiting user privileges, enforcing strong authentication, and monitoring for unusual local privilege escalation attempts. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Network segmentation can reduce the risk of lateral movement if an attacker gains local access. Regularly audit systems to identify any running legacy Windows 10 1809 instances and plan for their decommissioning. Additionally, disable or restrict the Windows Broadcast DVR User Service if it is not required in the environment to reduce the attack surface. Maintain updated backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4947ab3590319da0cb

Added to database: 11/11/2025, 6:11:21 PM

Last enriched: 11/18/2025, 7:22:06 PM

Last updated: 11/20/2025, 8:57:02 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats