CVE Alert: CVE-2025-54102 – Microsoft – Windows 10 Version 1809

CVE-2025-54102

HIGHNo exploitation known

Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422
CWE
CWE-416, CWE-416: Use After Free
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:00:49.048Z
Updated
2025-09-10T03:55:44.205Z

AI Summary Analysis

Risk verdict

High severity local privilege escalation risk with no current exploitation activity indicated; patch promptly for all affected Windows variants.

Why this matters

Allows an authorised attacker to escalate to SYSTEM, enabling full access to sensitive data and functions. Given the broad contact surface across client and server Windows editions, an adversary with local foothold could enable persistence and prepare for lateral movement within the environment.

Most likely attack path

Exploitation requires local access with low privileges and no user interaction, making initial compromise the primary barrier. Once on a host, an attacker could trigger memory-corruption resulting in privilege elevation within the Windows Connected Devices Platform Service, providing SYSTEM-level control and potential further abuse of adjacent services and data.

Who is most exposed

Enterprise endpoints and servers running affected Windows builds (10/11 and Server versions) with the platform service enabled are at risk, including systems with Server Core installations and newer 22H2/23H2 branches.

Detection ideas

  • Monitor for unusual service process spawning or crashes related to the Windows Connected Devices Platform Service.
  • Alert on unexpected privilege escalation attempts or creation of SYSTEM-level processes originating from the platform service.
  • Look for anomalous memory allocation patterns or crash dumps tied to the service.
  • Increased local authentication attempts or anomalous token manipulation events preceding escalation.

Mitigation and prioritisation

  • Apply the available Microsoft patch across all affected builds; verify deployment in a controlled pilot before broad rollout.
  • If patching is delayed, restrict the service and its accounts to the minimum required privileges; consider disabling the feature or isolating the service where feasible.
  • Enable enhanced EDR/EDR-like protections, application control, and memory-safety mitigations; enforce strict access controls on the service account.
  • Schedule coordinated patch windows and asset inventory reviews to ensure full coverage across all affected SKUs.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.