CVE Alert: CVE-2025-54092 – Microsoft – Windows 10 Version 1809

CVE-2025-54092

HIGHNo exploitation known

Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Hyper-V allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584
CWE
CWE-362, CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:01:18.383Z
Updated
2025-09-10T03:55:51.299Z

AI Summary Analysis

Risk verdict

High severity local privilege escalation risk; exploitation activity is not currently observed according to CISA ADP data.

Why this matters

If chained, an authorised local attacker could elevate to SYSTEM on a Hyper-V host, potentially compromising the host and any hosted VMs, undermining confidentiality, integrity and availability of virtualised workloads. Many organisations rely on Hyper-V across servers and endpoints, so a single unpatched host could become a pivot point for broader compromise within an environment.

Most likely attack path

Exploitation requires local access with low complexity and no user interaction, leveraging a race condition in Windows Hyper-V alongside a use-after-free flaw to lift privileges. The vulnerability impacts multiple Windows versions with scope limited to the affected component, so an attacker would need to operate within the host or a guest VM with Hyper-V access to gain higher privileges.

Who is most exposed

Organizations using Hyper-V in on-premises or cloud-hosted deployments, including Windows Server and desktops with Hyper-V enabled, are most at risk. Environments with guest-to-host or host-to-VM interactions are particularly relevant.

Detection ideas

  • Monitor for unusual Hyper-V process activity (e.g., vmwp.exe) or unexpected hypervisor calls.
  • Look for privilege-escalation events (e.g., new or elevated tokens) without corresponding admin action.
  • Detect memory/kernel anomalies or crash dumps related to Hyper-V components.
  • Enable enhanced auditing around virtualization management and unusual scheduling behaviour.

Mitigation and prioritisation

  • Apply the official Microsoft security update across affected OS versions as a priority.
  • If patching is delayed, restrict Hyper-V usage to essential hosts, disable unnecessary management features, and enforce least-privilege on Hyper-V admins.
  • Enable memory integrity and Hyper-V/Virtualisation-Based Security where feasible; ensure strong network segmentation for virtualization management traffic.
  • Verify patch deployment during change windows, with rollback plans and asset inventory updates.
  • Treat as priority 2 per standard risk, escalating if exploitation indicators emerge.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.