CVE Alert: CVE-2025-59512 – Microsoft – Windows 10 Version 1809

CVE-2025-59512

HIGHNo exploitation known

Improper access control in Customer Experience Improvement Program (CEIP) allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 Version 25H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.8027 | 10.0.17763.0 lt 10.0.17763.8027 | 10.0.17763.0 lt 10.0.17763.8027 | 10.0.20348.0 lt 10.0.20348.4405 | 10.0.19044.0 lt 10.0.19044.6575 | 10.0.19045.0 lt 10.0.19045.6575 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.26200.0 lt 10.0.26200.7171 | 10.0.22631.0 lt 10.0.22631.6199 | 10.0.22631.0 lt 10.0.22631.6199 | 10.0.25398.0 lt 10.0.25398.1965 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.14393.0 lt 10.0.14393.8594 | 10.0.14393.0 lt 10.0.14393.8594 | 10.0.14393.0 lt 10.0.14393.8594 | 6.2.9200.0 lt 6.2.9200.25768 | 6.2.9200.0 lt 6.2.9200.25768 | 6.3.9600.0 lt 6.3.9600.22869 | 6.3.9600.0 lt 6.3.9600.22869
CWE
CWE-284, CWE-284: Improper Access Control
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-11-11T17:59:19.195Z
Updated
2025-11-12T00:24:14.717Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation within the CEIP component; exploitation currently unproven but a patch is available and should be deployed promptly.

Why this matters

An attacker with local access can elevate privileges on affected Windows hosts, enabling broader compromise, persistence, and potential data/service impact. CEIP runs across many endpoints in typical deployments, increasing the blast radius if a host is compromised.

Most likely attack path

Given AV:L, AC:L, PR:L, UI:N, an authenticated attacker with local access can exploit with minimal preconditions and no user interaction. Once the flaw is triggered, privilege escalation occurs within the same host (Scope U), enabling higher-privilege activity but not inherently granting external access unless additional footholds exist.

Who is most exposed

Devices with CEIP enabled on Windows 10/11 clients and Windows Server installations, including endpoints with local admin rights or standard users who may run CEIP components.

Detection ideas

  • Unusual privilege-escalation events linked to CEIP-related processes.
  • Surges in process creation/modification around the CEIP service binary.
  • Security logs showing unexpected service changes or elevated token usage.
  • File integrity changes to CEIP components.
  • EDR alerts for suspicious local privilege escalation indicators on affected OS versions.

Mitigation and prioritisation

  • Apply the official Microsoft patch across all affected OSs; verify installation organisation-wide.
  • If patching is delayed, restrict CEIP service permissions, use application allowlisting, and minimise CEIP privileges.
  • Strengthen local account controls; enforce least privilege and MFA for administrator accounts.
  • Enable enhanced monitoring on endpoints; test patch in a controlled environment before broad rollout.
  • Document remediation actions; pursue a rapid, time-bound patch cycle.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features