Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60719: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2025-60719cvecve-2025-60719cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:52:57 UTC

Technical Analysis

CVE-2025-60719 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw resides in the Windows Ancillary Function Driver for WinSock, a component responsible for network socket operations. An untrusted pointer dereference occurs when the driver improperly handles pointers that can be controlled or influenced by an attacker, leading to memory corruption. This memory corruption can be leveraged by an authorized local attacker with low privileges to escalate their privileges on the system. The attack complexity is high, meaning exploitation requires specific conditions or knowledge, and no user interaction is needed. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing attackers to execute arbitrary code with elevated privileges, modify system files, or cause system instability. Although no public exploits are known at this time, the vulnerability is serious due to the potential for local privilege escalation, which is a common step in multi-stage attacks. The affected product is Windows 10 Version 1607, an older but still in-use operating system version, particularly in legacy or specialized environments. No patches are currently linked, indicating that remediation may be pending or in progress. The CVSS v3.1 base score is 7.0, reflecting high severity with local attack vector, high attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability.

Potential Impact

The primary impact of CVE-2025-60719 is local privilege escalation, allowing an attacker with limited access to gain higher system privileges. This can lead to full system compromise, enabling installation of persistent malware, disabling security controls, or accessing sensitive data. Organizations running Windows 10 Version 1607, especially those with legacy systems or specialized applications that cannot be easily upgraded, face significant risk. The vulnerability could be exploited as part of a multi-stage attack chain, where initial access is gained through other means and then privileges are escalated to achieve broader control. Critical infrastructure, government agencies, and enterprises relying on legacy Windows 10 deployments are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details become widely known. The high impact on confidentiality, integrity, and availability underscores the need for timely mitigation to prevent potential breaches or operational disruptions.

Mitigation Recommendations

1. Apply official patches from Microsoft as soon as they become available for Windows 10 Version 1607 to address the vulnerability directly. 2. If patching is not immediately possible, restrict local access to affected systems by enforcing strict access controls and limiting user privileges. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious activities indicative of privilege escalation attempts. 4. Conduct regular audits of user accounts and permissions to minimize the number of users with local access rights. 5. Use network segmentation to isolate legacy systems running Windows 10 Version 1607 from critical network segments. 6. Educate system administrators and users about the risks of local privilege escalation and encourage reporting of unusual system behavior. 7. Consider upgrading affected systems to supported Windows versions where feasible to reduce exposure to legacy vulnerabilities. 8. Monitor security advisories from Microsoft and threat intelligence sources for updates on exploit availability and mitigation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4a47ab3590319da0f7

Added to database: 11/11/2025, 6:11:22 PM

Last enriched: 2/27/2026, 5:52:57 AM

Last updated: 3/26/2026, 7:59:30 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses