CVE-2025-49724
Published: 08 July 2025
Summary
CVE-2025-49724 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows 10 1809. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 16.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely installation of Microsoft patches directly remediates the use-after-free vulnerability in Windows Connected Devices Platform Service.
Memory protection safeguards like DEP and ASLR prevent successful arbitrary code execution from use-after-free exploits.
Malicious code protection mechanisms block or detect the malicious content used to trigger remote exploitation of the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free RCE in client Windows service with network vector and required user interaction directly maps to client-side exploitation for code execution.
NVD Description
Use after free in Windows Connected Devices Platform Service allows an unauthorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-49724 is a use-after-free vulnerability (CWE-416) in the Windows Connected Devices Platform Service. Published on 2025-07-08, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and enables an unauthorized attacker to execute code over a network.
The vulnerability can be exploited remotely by an attacker with no privileges who tricks a user into performing an action, such as interacting with malicious content. Successful exploitation allows arbitrary code execution, potentially compromising confidentiality, integrity, and availability with high impact under an unchanged scope.
Microsoft's update guide provides details on mitigation and patching for this vulnerability at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49724.
Details
- CWE(s)