CVE Alert: CVE-2025-59220 – Microsoft – Windows Server 2022

CVE-2025-59220

HIGHNo exploitation known

Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025
Versions
10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19043.6332 | 10.0.22621.0 lt 10.0.22631.5909 | 10.0.19045.0 lt 10.0.19044.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584
CWE
CWE-362, CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-18T21:28:25.888Z
Updated
2025-09-18T21:42:51.888Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation on affected Windows devices; patching should be treated as a priority, pending confirmation of active exploitation indicators.

Why this matters

The flaw enables an authenticated, locally-present attacker to rise to SYSTEM via a race condition in the Bluetooth service, potentially compromising data and credentials. In enterprise fleets with Bluetooth enabled, this can enable persistence, credential access, and lateral movement from a compromised endpoint.

Most likely attack path

An attacker who already has local access and minimal privileges (no user interaction required) can trigger the race condition in the Bluetooth service to escalate privileges. The attack is local (AV:L), with low-required privileges (PR:L) and no UI required, making it feasible for commodity malware on a compromised workstation. Exploitation could enable control of the host and subsequent domain or asset access if footholds exist.

Who is most exposed

Endpoints with Bluetooth enabled—desktop and laptop workstations running Windows 10/11 and Windows Server variants listed—are most at risk, especially in remote or bring-your-own-device deployments where devices travel between networks.

Detection ideas

  • Look for unexpected privilege-escalation events (e.g., 4672, 4688) originating from Bluetooth service processes.
  • Monitor for Bluetooth service crashes or rapid restarts, memory corruption indicators, or anomalous driver loads.
  • Detect suspicious Bluetooth-related binary or service modifications without approved change tickets.
  • Identify abnormal post-exploitation activity on endpoints (unusual credential access, new admin sessions).

Mitigation and prioritisation

  • Apply the official Microsoft patch as soon as available; verify in a test pilot before broad rollout.
  • If KEV true or EPSS ≥ 0.5, treat as Priority 1; otherwise, maintain High with rapid remediation.
  • Disable Bluetooth or enforce strict application/device controls where Bluetooth is unnecessary.
  • Enforce least-privilege user policies and robust endpoint detection, with updated allowlists.
  • Schedule coordinated patch windows; implement rollback and monitoring post-deployment.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.