CVE Alert: CVE-2025-59514 – Microsoft – Windows 10 Version 1809

CVE-2025-59514

HIGHNo exploitation known

Improper privilege management in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 Version 25H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.8027 | 10.0.17763.0 lt 10.0.17763.8027 | 10.0.17763.0 lt 10.0.17763.8027 | 10.0.20348.0 lt 10.0.20348.4405 | 10.0.19044.0 lt 10.0.19044.6575 | 10.0.19045.0 lt 10.0.19045.6575 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.26200.0 lt 10.0.26200.7171 | 10.0.22631.0 lt 10.0.22631.6199 | 10.0.22631.0 lt 10.0.22631.6199 | 10.0.25398.0 lt 10.0.25398.1965 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.26100.0 lt 10.0.26100.7171 | 10.0.14393.0 lt 10.0.14393.8594 | 10.0.14393.0 lt 10.0.14393.8594 | 10.0.14393.0 lt 10.0.14393.8594 | 6.0.6003.0 lt 6.0.6003.23624 | 6.0.6003.0 lt 6.0.6003.23624 | 6.1.7601.0 lt 6.1.7601.28021 | 6.1.7601.0 lt 6.1.7601.28021 | 6.2.9200.0 lt 6.2.9200.25768 | 6.2.9200.0 lt 6.2.9200.25768 | 6.3.9600.0 lt 6.3.9600.22869 | 6.3.9600.0 lt 6.3.9600.22869
CWE
CWE-269, CWE-269: Improper Privilege Management
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-11-11T17:59:35.037Z
Updated
2025-11-12T00:24:30.357Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation; exploitation state is not specified, but the impact is significant on affected Windows endpoints and servers—patch promptly when available.

Why this matters

An attacker with local access and low privileges can elevate to SYSTEM, enabling full access to protected data and persistence on the host. The vulnerability spans multiple Windows desktop and server SKUs, including recent Server Core and client editions, increasing the attack surface across enterprise endpoints.

Most likely attack path

Attacker already has a usable account or foothold on a host (AV:L, PR:L, UI:N) and can trigger the Streaming Service Proxy vulnerability without user interaction. Successful exploitation grants high privileges on the compromised host, with no scope expansion required by CVSS, facilitating access to sensitive resources and potential lateral moves through compromised credentials or tokens.

Who is most exposed

Large organisations with mixed Windows deployments (legacy on 1607/1809, via 21H2/22H2 clients and Server 2019–2025 variants) are at risk, particularly where streaming or proxy services run with elevated tokens. Environments with extensive on‑premises endpoints and Server Core installations are especially exposed.

Detection ideas

  • Unusual privilege escalation events for non-admin users (token elevation to SYSTEM).
  • Sudden process spawns or service changes associated with the Streaming Service Proxy.
  • Anomalous logon or token impersonation activity from standard user accounts.
  • Unexpected service or scheduled task creations/modifications around the proxy.
  • EDR/SEIM alerts for privilege/credential misuse on affected Windows versions.

Mitigation and prioritisation

  • Apply the vendor patch to all affected Windows versions; verify deployment in maintenance windows.
  • Enforce least privilege and monitor for abnormal proxy/service activity; restrict unnecessary streaming proxy use.
  • Confirm configuration baselines for services running with elevated rights; remove or sandbox where feasible.
  • Ensure robust endpoint detection and response coverage; accelerate remediation if KEV or EPSS signals arise (treat as priority 1). Maintain hotfix SLAs and verify post‑patch readings.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features