CVE Alert: CVE-2025-53800 – Microsoft – Windows 10 Version 1809

CVE-2025-53800

HIGHNo exploitation known

No cwe for this issue in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422
CWE
CWE-1419, CWE-1419: Incorrect Initialization of Resource
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:01:10.938Z
Updated
2025-09-09T19:23:26.363Z

AI Summary Analysis

Risk verdict

Why this matters

Most likely attack path

Who is most exposed

Detection ideas

  • Security Event 4672 (Special Privilege Assigned) or anomalous elevation events shortly after logon.
  • Unusual process creations initiated by graphics subsystem binaries or services.
  • Kernel-mode or driver-loading anomalies linked to graphics components.
  • Repeated local privilege escalation attempts from the same host or user.
  • Sudden SYSTEM-level service changes without approved change tickets.

Mitigation and prioritisation

  • Apply the latest Microsoft security updates to all affected hosts; verify patch deployment and test in staging before broad rollout.
  • Enforce least privilege, restrict local admin usage, and segment management networks to limit local footholds.
  • Enable EDR/EDR-yielded detections for privilege-escalation patterns; monitor for 4672 events and abnormal process trees.
  • Use AppLocker/WDAC where feasible to restrict unapproved binaries in graphics-related paths.
  • Change-management: plan a coordinated patch window; communicate expected downtime and rollback plans; verify post-patch functionality across key line-of-business systems.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.