CVE-2025-54102
Use · Use Multiple Products
A high-severity vulnerability exists within the Windows Connected Devices Platform Service, which could impact multiple products from the vendor "Use".
Executive summary
A high-severity vulnerability exists within the Windows Connected Devices Platform Service, which could impact multiple products from the vendor "Use". An attacker who already has standard user access to a system can exploit this flaw to gain full administrative privileges. Successful exploitation would allow the attacker to take complete control of the affected machine, leading to potential data theft, malware installation, and further network intrusion.
Vulnerability
This vulnerability is a "use-after-free" memory corruption flaw in the Windows Connected Devices Platform Service (cdpsvc). An authenticated attacker with local access can send specially crafted data to this service, causing it to incorrectly handle memory that has already been deallocated. By manipulating this memory corruption, the attacker can execute arbitrary code with the elevated permissions of the cdpsvc service, which typically runs with SYSTEM-level privileges, resulting in a full local privilege escalation.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Exploitation allows an attacker to escalate from a low-privilege user to a system administrator, completely compromising the confidentiality, integrity, and availability of the affected endpoint. A compromised system can be used to install persistent backdoors, deploy ransomware, exfiltrate sensitive data, disable security controls, and serve as a pivot point to move laterally across the corporate network, significantly increasing the risk of a widespread security breach.
Remediation
Immediate Action: Identify all vulnerable systems and apply the security updates provided by the vendor immediately. Prioritize patching for critical systems, including servers and workstations with access to sensitive information. After patching, monitor for any signs of exploitation attempts by reviewing system and security logs for anomalous activity related to the Connected Devices Platform Service.
Proactive Monitoring: Configure security monitoring tools to detect potential exploitation. Look for crashes or unexpected restarts of the cdpsvc service in Windows Event Logs (System log). Monitor for suspicious child processes spawned by svchost.exe hosting the cdpsvc service. Endpoint Detection and Response (EDR) solutions should be tuned to detect memory exploitation techniques and unauthorized privilege escalation events (e.g., Windows Event ID 4672).
Compensating Controls: If immediate patching is not feasible, consider disabling the "Connected Devices Platform Service" on systems where its functionality (e.g., "Nearby Sharing," "Project to this PC") is not required. This action removes the attack surface but should be tested thoroughly to avoid disrupting business operations. Enforce the principle of least privilege for all user accounts to limit the initial access an attacker might have.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 7.8 and the critical impact of a successful privilege escalation attack, we strongly recommend that organizations prioritize the immediate patching of this vulnerability. While CVE-2025-54102 is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its nature makes it a prime target for future exploitation. Organizations should treat this as an urgent threat and expedite remediation efforts to prevent potential system compromise.