CVE Alert: CVE-2025-50175 – Microsoft – Windows 10 Version 1809

CVE-2025-50175

HIGHNo exploitation known

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 11 Version 25H2
Versions
10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.19044.0 lt 10.0.19044.6456 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.19045.0 lt 10.0.19045.6456 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26200.0 lt 10.0.26200.6899
CWE
CWE-416, CWE-416: Use After Free
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-10-14T17:00:56.629Z
Updated
2025-10-14T19:38:30.949Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation on affected Windows platforms; patch promptly for systems that permit local access.

Why this matters

An authenticated user could elevate to SYSTEM, enabling persistence, broad data access, and potential compromise of domain trust relationships. In practice, this raises the threat to endpoints and servers across enterprise networks, particularly where patch cadence is slow or heterogeneous.

Most likely attack path

  • Preconditions: local access (AV:L, AC:L, PR:L, UI:N) with Scope Unchanged.
  • attacker could trigger a use-after-free in Windows Digital Media to gain full control on the host, then reuse compromised tokens or credentials to move laterally within the host and, if privileges allow, impact adjacent systems.

Who is most exposed

Commonly exposed in organisations with mixed Windows 10/11/Server deployments and devices where digital media components are enabled or not tightly controlled; environments lacking uniform patch management are most at risk.

Detection ideas

  • Monitor for media-related process crashes and heap/memory corruption dumps.
  • Watch for sudden priviledge-escalation activity: unexpected SYSTEM-level process creation, token impersonation, or new services/tasks.
  • Inspect Windows Event Logs and crash dumps for use-after-free patterns in the digital media subsystem.
  • Sudden changes to security tokens or unusual lateral movement activity following media processing events.

Mitigation and prioritisation

  • Apply the vendor’s latest Windows updates addressing this vulnerability; test in a controlled pilot before broader rollout.
  • Enforce least-privilege, reduce local accounts, and tighten access to Windows Digital Media components.
  • Enable robust EDR/EDR-like monitoring to detect privilege-escalation indicators and media-subsystem anomalies.
  • Change-management: schedule a targeted patch window; ensure rollback paths and backups.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1; otherwise, maintain high-priority remediation across affected estates.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.