CVE-2025-60717: CWE-416: Use After Free in Microsoft Windows 10 Version 1809
Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-60717 is a use-after-free vulnerability classified under CWE-416 found in the Windows Broadcast DVR User Service component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises when the service improperly manages memory, leading to a scenario where previously freed memory is accessed, potentially allowing an attacker to execute arbitrary code or escalate privileges. The flaw specifically allows an authorized attacker with low privileges on the local machine to elevate their privileges to higher levels without requiring user interaction. The CVSS v3.1 base score is 7.0, indicating high severity, with vector metrics AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access, high complexity, low privileges, no user interaction, unchanged scope, and impacts confidentiality, integrity, and availability at a high level. No public exploits are known yet, and no patches have been released at the time of publication. The vulnerability was reserved in late September 2025 and published in November 2025. The Broadcast DVR User Service is responsible for recording gameplay and broadcasting features, and its compromise could allow attackers to gain SYSTEM-level privileges, potentially leading to full system compromise. The vulnerability is particularly concerning for environments where legacy Windows 10 1809 systems remain in use, as this version is out of mainstream support, increasing exposure risk due to delayed patching.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in sectors relying on legacy Windows 10 1809 systems such as government agencies, critical infrastructure, and enterprises with slow upgrade cycles. Successful exploitation could lead to privilege escalation, allowing attackers to bypass security controls, access sensitive data, deploy malware, or disrupt services. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate data, alter system configurations, or cause denial of service. Since the attack requires local access, insider threats or attackers who have gained initial footholds via other means could leverage this vulnerability to escalate privileges and move laterally within networks. The lack of available patches increases the window of exposure, and organizations that do not upgrade or mitigate risk may face increased chances of targeted attacks. The vulnerability's high complexity and local access requirement somewhat limit widespread exploitation but do not eliminate risk in environments with multiple user accounts or shared systems.
Mitigation Recommendations
European organizations should prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version to eliminate exposure. Until patches are available, organizations should implement strict local access controls, including limiting user privileges, enforcing strong authentication, and monitoring for unusual local privilege escalation attempts. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Network segmentation can reduce the risk of lateral movement if an attacker gains local access. Regularly audit systems to identify any running legacy Windows 10 1809 instances and plan for their decommissioning. Additionally, disable or restrict the Windows Broadcast DVR User Service if it is not required in the environment to reduce the attack surface. Maintain updated backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60717: CWE-416: Use After Free in Microsoft Windows 10 Version 1809
Description
Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-60717 is a use-after-free vulnerability classified under CWE-416 found in the Windows Broadcast DVR User Service component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises when the service improperly manages memory, leading to a scenario where previously freed memory is accessed, potentially allowing an attacker to execute arbitrary code or escalate privileges. The flaw specifically allows an authorized attacker with low privileges on the local machine to elevate their privileges to higher levels without requiring user interaction. The CVSS v3.1 base score is 7.0, indicating high severity, with vector metrics AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access, high complexity, low privileges, no user interaction, unchanged scope, and impacts confidentiality, integrity, and availability at a high level. No public exploits are known yet, and no patches have been released at the time of publication. The vulnerability was reserved in late September 2025 and published in November 2025. The Broadcast DVR User Service is responsible for recording gameplay and broadcasting features, and its compromise could allow attackers to gain SYSTEM-level privileges, potentially leading to full system compromise. The vulnerability is particularly concerning for environments where legacy Windows 10 1809 systems remain in use, as this version is out of mainstream support, increasing exposure risk due to delayed patching.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in sectors relying on legacy Windows 10 1809 systems such as government agencies, critical infrastructure, and enterprises with slow upgrade cycles. Successful exploitation could lead to privilege escalation, allowing attackers to bypass security controls, access sensitive data, deploy malware, or disrupt services. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate data, alter system configurations, or cause denial of service. Since the attack requires local access, insider threats or attackers who have gained initial footholds via other means could leverage this vulnerability to escalate privileges and move laterally within networks. The lack of available patches increases the window of exposure, and organizations that do not upgrade or mitigate risk may face increased chances of targeted attacks. The vulnerability's high complexity and local access requirement somewhat limit widespread exploitation but do not eliminate risk in environments with multiple user accounts or shared systems.
Mitigation Recommendations
European organizations should prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version to eliminate exposure. Until patches are available, organizations should implement strict local access controls, including limiting user privileges, enforcing strong authentication, and monitoring for unusual local privilege escalation attempts. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Network segmentation can reduce the risk of lateral movement if an attacker gains local access. Regularly audit systems to identify any running legacy Windows 10 1809 instances and plan for their decommissioning. Additionally, disable or restrict the Windows Broadcast DVR User Service if it is not required in the environment to reduce the attack surface. Maintain updated backups and incident response plans to quickly recover from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-26T05:03:24.537Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69137c4947ab3590319da0cb
Added to database: 11/11/2025, 6:11:21 PM
Last enriched: 11/18/2025, 7:22:06 PM
Last updated: 11/20/2025, 8:57:02 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumCVE-2025-11676: CWE-20 Improper Input Validation in TP-Link System Inc. TL-WR940N V6
HighCVE-2024-4438: Uncontrolled Resource Consumption
HighCVE-2024-4437: Uncontrolled Resource Consumption
HighCVE-2023-3899: Improper Authorization in Red Hat Red Hat Enterprise Linux 7
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.