Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60719: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-60719cvecve-2025-60719cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:22:35 UTC

Technical Analysis

CVE-2025-60719 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists in the Windows Ancillary Function Driver for WinSock, a component responsible for network socket operations. An untrusted pointer dereference occurs when the driver improperly handles pointers that can be influenced by an attacker, leading to memory corruption. This vulnerability allows an attacker with local authorized access to escalate privileges on the affected system, potentially gaining SYSTEM-level rights. The CVSS v3.1 score is 7.0, indicating high severity, with the vector indicating local attack vector (AV:L), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches were linked at the time of publication, and no known exploits are reported in the wild. The vulnerability requires local presence and elevated complexity to exploit, but successful exploitation can lead to complete system compromise, making it a critical concern for endpoint security. The flaw specifically targets a core Windows networking driver, which is integral to many networked applications and services.

Potential Impact

For European organizations, the impact of CVE-2025-60719 is significant. Successful exploitation can lead to privilege escalation, allowing attackers to bypass security controls and execute arbitrary code with SYSTEM privileges. This can compromise sensitive data confidentiality, integrity, and availability of critical systems. Organizations relying on Windows 10 Version 1809, particularly those in sectors such as finance, healthcare, government, and critical infrastructure, face increased risk of targeted attacks. The local access requirement limits remote exploitation but insider threats or malware with local execution capabilities can leverage this vulnerability. The high impact on system integrity and availability could disrupt business operations and lead to data breaches, regulatory non-compliance, and reputational damage. Given the widespread use of Windows 10 in Europe, the vulnerability poses a broad risk, especially where legacy systems have not been updated.

Mitigation Recommendations

1. Apply official Microsoft patches as soon as they become available to remediate the vulnerability. 2. If patches are not yet available, restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and limiting administrative privileges. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to WinSock driver usage or privilege escalation attempts. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or rights that could be exploited. 5. Implement application whitelisting to prevent unauthorized code execution. 6. Educate users and administrators about the risks of local privilege escalation vulnerabilities and encourage prompt reporting of suspicious activity. 7. Consider upgrading affected systems to a more recent, supported Windows version where this vulnerability is not present. 8. Use network segmentation to limit the spread of potential compromises originating from exploited endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4a47ab3590319da0f7

Added to database: 11/11/2025, 6:11:22 PM

Last enriched: 11/18/2025, 7:22:35 PM

Last updated: 11/22/2025, 4:38:32 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats