Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62573: CWE-416: Use After Free in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-62573cvecve-2025-62573cwe-416cwe-362
Published: Tue Dec 09 2025 (12/09/2025, 17:55:43 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:58:32 UTC

Technical Analysis

CVE-2025-62573 is a use-after-free vulnerability classified under CWE-416 found in the Windows DirectX component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). Use-after-free vulnerabilities occur when a program continues to use memory after it has been freed, leading to undefined behavior such as memory corruption, crashes, or code execution. In this case, an authorized attacker with low privileges on the local system can exploit this flaw to elevate their privileges, potentially gaining SYSTEM-level access. The vulnerability does not require user interaction, which increases its risk profile. The CVSS v3.1 base score is 7.0, indicating high severity, with attack vector local (AV:L), attack complexity high (AC:H), privileges required low (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No known exploits have been reported in the wild, and no patches have been published yet, though the vulnerability was reserved in mid-October 2025 and published in December 2025. The lack of patches means organizations must rely on mitigation strategies until updates are available. This vulnerability is particularly concerning because DirectX is a widely used multimedia API, and exploitation could lead to full system compromise from a local attacker. The affected version, Windows 10 1809, is an older release, but still in use in some environments, especially where legacy applications or hardware compatibility is required.

Potential Impact

For European organizations, the impact of CVE-2025-62573 can be significant. Successful exploitation allows a low-privileged local user to escalate privileges to SYSTEM level, potentially leading to full control over affected systems. This can result in unauthorized access to sensitive data, disruption of critical services, and the ability to deploy further malware or ransomware. Organizations in sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk due to the potential for data breaches and operational disruption. Since the vulnerability affects Windows 10 Version 1809, environments that have not upgraded to newer Windows versions or applied mitigations remain vulnerable. The absence of a patch increases the window of exposure, making internal threat actors or attackers with initial local access more dangerous. Additionally, the high impact on confidentiality, integrity, and availability means that exploitation could lead to severe business and reputational damage. The requirement for local access limits remote exploitation but does not eliminate risk in environments where attackers can gain initial footholds through other means, such as phishing or insider threats.

Mitigation Recommendations

1. Restrict local access to systems running Windows 10 Version 1809 by enforcing strict user account controls and limiting administrative privileges. 2. Implement application whitelisting and endpoint protection solutions that can detect anomalous behavior related to privilege escalation attempts. 3. Monitor event logs and system behavior for signs of exploitation attempts, focusing on processes interacting with DirectX components. 4. Where possible, upgrade affected systems to a supported and patched version of Windows 10 or later to eliminate the vulnerability. 5. Apply any security updates or patches released by Microsoft promptly once available. 6. Use virtualization or sandboxing for applications that heavily rely on DirectX to reduce the attack surface. 7. Conduct regular security awareness training to reduce the risk of attackers gaining initial local access. 8. Employ network segmentation to limit lateral movement if a local compromise occurs. 9. Consider deploying host-based intrusion detection systems (HIDS) that can alert on suspicious privilege escalation activities. 10. Maintain an up-to-date asset inventory to identify and prioritize remediation of vulnerable systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.222Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e974ebaa3babafb6fe

Added to database: 12/9/2025, 6:18:17 PM

Last enriched: 1/8/2026, 12:58:32 AM

Last updated: 2/7/2026, 7:21:56 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats