CVE Alert: CVE-2025-54098 – Microsoft – Windows 10 Version 1809

CVE-2025-54098

HIGHNo exploitation known

Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.10240.0 lt 10.0.10240.21128 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 6.1.7601.0 lt 6.1.7601.27929 | 6.1.7601.0 lt 6.1.7601.27929 | 6.2.9200.0 lt 6.2.9200.25675 | 6.2.9200.0 lt 6.2.9200.25675 | 6.3.9600.0 lt 6.3.9600.22774 | 6.3.9600.0 lt 6.3.9600.22774
CWE
CWE-284, CWE-284: Improper Access Control
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:01:20.010Z
Updated
2025-09-10T03:55:50.506Z

AI Summary Analysis

Risk verdict

High-risk local privilege escalation on Windows Hyper-V hosts; no evidence of active exploitation at present, but patch promptly.

Why this matters

An attacker with host access could escalate to SYSTEM, gaining full control of the host and all connected VMs, and potentially exfiltrating or altering guest workloads. The impact spans confidentiality, integrity and availability of virtualised assets, making unpatched hosts attractive targets in data-centre and lab environments alike.

Most likely attack path

Exploitation would require local access with low privileges (no user interaction) and targets the Hyper-V stack (AV:L, AC:L, PR:L, UI:N, Scope: U). If successful, the attacker could elevate within the host, with limited immediate lateral reach to other hosts or networks unless misconfigurations exist. A PoC indicator is not disclosed in the data, so current visibility of practical exploit code is uncertain.

Who is most exposed

Hyper-V hosts in enterprise data centres, Windows servers/clients with the Hyper-V role enabled, and lab/test environments are most at risk, especially if local admin rights are widespread or VM management tooling sits on shared workstations.

Detection ideas

  • Elevated-privilege attempts targeting SYSTEM on Hyper-V services (vmms.exe, Hyper-V components).
  • Unusual driver/service loads or new/unsigned Hyper-V related modules.
  • Anomalous process trees around VMMS or hv components with high integrity.
  • Surges in local authentication/privilege-use events (4688/4672) tied to virtualization processes.

Mitigation and prioritisation

  • Patch as soon as Microsoft-supplied updates are applied; treat as priority 1 if KEV is present or EPSS ≥ 0.5.
  • Restrict local admin rights on Hyper-V hosts; enforce least privilege and just-in-time admin.
  • Disable or minimise exposed Hyper-V management interfaces; limit remote management where not required.
  • Strengthen endpoint detection (EDR, logging) around Hyper-V processes and VM management tools; verify code integrity of vmms/hyperv drivers.
  • Change-management: test patches in a staging environment, schedule a controlled rollout, verify VM integrity post-patch.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.