Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60719: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-60719cvecve-2025-60719cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:14:35 UTC

Technical Analysis

CVE-2025-60719 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists in the Windows Ancillary Function Driver for WinSock, a component responsible for network socket operations. The vulnerability arises from the improper dereferencing of pointers that are not properly validated or sanitized, allowing an attacker with local authorized access to manipulate memory references. This can lead to elevation of privileges, enabling the attacker to execute code with higher system privileges than originally granted. The attack vector is local (AV:L), requiring the attacker to have low privileges (PR:L) but no user interaction (UI:N). The attack complexity is high (AC:H), indicating exploitation requires specialized conditions or knowledge. The vulnerability impacts confidentiality, integrity, and availability (all rated high), meaning an attacker could gain unauthorized access to sensitive data, modify system configurations, or disrupt system operations. Although no public exploits have been reported, the vulnerability is significant due to the potential for privilege escalation on affected systems. The vulnerability was published on November 11, 2025, and no patches have been linked yet, indicating organizations should prepare for imminent remediation. This vulnerability is particularly relevant for environments still running Windows 10 Version 1809, which is an older release but may remain in use in some enterprise or industrial contexts.

Potential Impact

For European organizations, the impact of CVE-2025-60719 can be substantial, especially in sectors relying on legacy Windows 10 Version 1809 systems such as manufacturing, healthcare, and government. Successful exploitation allows attackers to escalate privileges locally, potentially leading to full system compromise, unauthorized data access, and disruption of critical services. This could facilitate lateral movement within networks, increasing the risk of broader breaches. Confidentiality breaches could expose sensitive personal and corporate data, conflicting with GDPR requirements. Integrity violations might result in unauthorized changes to system configurations or software, undermining trust in IT systems. Availability impacts could disrupt business operations, causing financial and reputational damage. The high attack complexity and requirement for local access somewhat limit the threat to insiders or attackers who have already gained initial footholds, but the absence of required user interaction increases risk in environments where local access controls are weak.

Mitigation Recommendations

1. Apply security patches promptly once Microsoft releases them for Windows 10 Version 1809 to address CVE-2025-60719. 2. Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and using least privilege principles. 3. Employ endpoint detection and response (EDR) solutions to monitor for suspicious activities indicative of privilege escalation attempts. 4. Conduct regular audits of user accounts and permissions to minimize the number of users with local access rights. 5. Consider upgrading affected systems to a more recent, supported Windows version to reduce exposure to legacy vulnerabilities. 6. Implement network segmentation to limit the impact of a compromised host. 7. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving local privilege escalation. 8. Use application whitelisting and exploit mitigation technologies such as Control Flow Guard (CFG) and Data Execution Prevention (DEP) to reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4a47ab3590319da0f7

Added to database: 11/11/2025, 6:11:22 PM

Last enriched: 1/2/2026, 11:14:35 PM

Last updated: 1/7/2026, 8:45:59 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats