CVE Alert: CVE-2025-54099 – Microsoft – Windows 10 Version 1809

CVE-2025-54099

HIGHNo exploitation known

Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.10240.0 lt 10.0.10240.21128 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 6.0.6003.0 lt 6.0.6003.23529 | 6.0.6003.0 lt 6.0.6003.23529 | 6.0.6003.0 lt 6.0.6003.23529 | 6.1.7601.0 lt 6.1.7601.27929 | 6.1.7601.0 lt 6.1.7601.27929 | 6.2.9200.0 lt 6.2.9200.25675 | 6.2.9200.0 lt 6.2.9200.25675 | 6.3.9600.0 lt 6.3.9600.22774 | 6.3.9600.0 lt 6.3.9600.22774
CWE
CWE-121, CWE-121: Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:00:47.771Z
Updated
2025-09-09T22:38:41.816Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation on Windows endpoints; exploitation is not currently observed in the wild, but patching should be treated as urgent.

Why this matters

Authenticated attackers can elevate to SYSTEM via a stack-based overflow in the kernel driver, enabling full host compromise, persistence, and potential lateral movement. With a broad set of affected Windows versions, enterprises face widespread exposure across desktops and servers.

Most likely attack path

Requires local access (AV:L) and no user interaction (UI:N) but high complexity (AC:H). An attacker with foothold could trigger the kernel overflow in the WinSock ancillary driver, gaining SYSTEM privileges and then leveraging credentials to move laterally within the network.

Who is most exposed

Organisation-wide risk for those running Windows 10/11 and Windows Server deployments on affected builds, especially where patching lags or older servers remain unpatched.

Detection ideas

  • Kernel crash dumps or blue-screen events referencing afd.sys or WinSock components
  • Unauthorised creation or spawning of SYSTEM-level processes from non-privileged accounts
  • Unscheduled driver load/unload events for the WinSock ancillary driver

Mitigation and prioritisation

  • Patch all affected Windows builds to the latest cumulative updates; verify inventory and patch status
  • Enforce least-privilege, monitor for privilege-escalation activity, and restrict local admin use
  • Enable EDR with kernel-diagnostic logging; promptly investigate related crash dumps
  • Change-management: schedule testing in a staging environment, then deploy in waves to minimise disruption

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.