CVE Alert: CVE-2025-55326 – Microsoft – Windows 10 Version 1809

CVE-2025-55326

HIGHNo exploitation known

Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network.

CVSS v3.1 (7.5)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025
Versions
10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.19044.0 lt 10.0.19044.6456 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.19045.0 lt 10.0.19045.6456 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899
CWE
CWE-416, CWE-416: Use After Free
Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-10-14T17:00:59.637Z
Updated
2025-10-14T23:55:53.671Z

AI Summary Analysis

Risk verdict

High risk: remote code execution via Cdpsvc with network access; exploitation plausibility is indicated by CVSS but exploitation evidence and EPSS/KEV indicators are not provided.

Why this matters

An attacker able to trigger the vulnerability through user interaction could execute arbitrary code on affected Windows hosts, potentially gaining full control, data exfiltration, or ransomware deployment. The breadth of affected OS versions across client and server editions means a large attack surface in many organisations.

Most likely attack path

Attack prerequisites include user interaction to initiate the exploit, then remote code execution over the network via the Cdpsvc service. The vulnerability has no required privileges at initial access (PR:N), but results in high-impact compromise (I:H/C:H/A:H). Lateral movement is plausible if the attacker achieves system-level code execution and the environment allows Cdpsvc-mediated actions.

Who is most exposed

Enterprise desktops and servers running any of the listed Windows versions (including current and recent Server editions) are at risk, especially where Cdpsvc is reachable from user workstations or other servers. Organisations with large Windows deployments and remote/line-of-business devices are most exposed.

Detection ideas

  • Unusual Cdpsvc process activity or child process spawning.
  • Memory corruption indicators, crash dumps, or repeated Cdpsvc-related failures in System/Application logs.
  • Anomalous network activity involving Cdpsvc or related device-management endpoints.
  • Suspicious authentication or privilege escalation events following Cdpsvc usage.
  • EDR alerts for memory corruption patterns or unexpected code execution originating from system services.

Mitigation and prioritisation

  • Apply the Microsoft patch/updates addressing CVE-2025-55326 on all affected builds.
  • Enable automatic updates; verify patch integrity across devices.
  • If patching delayed, restrict network access to Cdpsvc, segment affected systems, and limit remote hostile interaction through EDR policies.
  • Strengthen monitoring: enable detailed logging for Cdpsvc, deploy application whitelisting, and conduct targeted scans for anomaly patterns.
  • Plan patching in a defined maintenance window with testing on a representative subset. If KEV/EPSS data become available, adjust priority to 1 accordingly.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features