CVE Alert: CVE-2025-59507 – Microsoft – Windows 10 Version 1809

CVE-2025-59507

HIGHNo exploitation known

Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Speech allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 Version 25H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.8027 | 10.0.17763.0 lt 10.0.17763.8027 | 10.0.17763.0 lt 10.0.17763.8027 | 10.0.20348.0 lt 10.0.20348.4405 | 10.0.19044.0 lt 10.0.19044.6575 | 10.0.19045.0 lt 10.0.19045.6575 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.26200.0 lt 10.0.26200.7171 | 10.0.22631.0 lt 10.0.22631.6199 | 10.0.22631.0 lt 10.0.22631.6199 | 10.0.25398.0 lt 10.0.25398.1965 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.14393.0 lt 10.0.14393.8594 | 10.0.14393.0 lt 10.0.14393.8594 | 10.0.14393.0 lt 10.0.14393.8594
CWE
CWE-362, CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-11-11T17:59:15.696Z
Updated
2025-11-12T00:24:11.030Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation on affected Windows builds; patch is available through standard update channels, but exploitation requires local access and no user interaction. There is no explicit KEV or SSVC exploitation state indicated in the data.

Why this matters

A successful elevation to higher privileges enables attacker-controlled code execution, potential persistence, and lateral movement within the host or network. Given multiple Windows editions and versions are affected, the enterprise attack surface broadens for endpoints where Speech Runtime is present or invoked by user processes.

Most likely attack path

Attacker with normal user privileges runs code that triggers Windows Speech Runtime paths; a race condition in shared resources allows elevation to higher privileges. The exploit relies on local access (AV/L), with no user interaction required (UI: none) and a restricted precondition (PR: low). Scope remains unchanged, enabling escalation within the compromised host’s resources.

Who is most exposed

End-user desktops, laptops, and servers with Windows Speech Runtime installed across enterprise environments are most at risk, especially where telephony or voice-enabled features are enabled and accessed by regular users.

Detection ideas

  • Monitor for unexpected process activity around Windows Speech Runtime components.
  • Look for privilege-escalation attempts originating from non-admin accounts.
  • Detect anomalous concurrency or timing patterns involving speech-related APIs.
  • Alert on unusual access to speech engine binaries or libraries.
  • Correlate spikes in local privilege changes with related logon events.

Mitigation and prioritisation

  • Apply the official patch via Windows Update/WSUS; verify all affected builds are updated.
  • Enforce least privilege and robust UAC; consider disabling Speech Runtime features if not required.
  • Use application whitelisting and EDR coverage to detect exploitation attempts.
  • Schedule patching in a controlled change window with testing; validate compatibility.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1; otherwise treat as priority 2.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features