CVE Alert: CVE-2025-54110 – Microsoft – Windows 10 Version 1809

CVE-2025-54110

HIGHNo exploitation known

Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (8.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.10240.0 lt 10.0.10240.21128 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 6.0.6003.0 lt 6.0.6003.23529 | 6.0.6003.0 lt 6.0.6003.23529 | 6.0.6003.0 lt 6.0.6003.23529 | 6.1.7601.0 lt 6.1.7601.27929 | 6.1.7601.0 lt 6.1.7601.27929 | 6.2.9200.0 lt 6.2.9200.25675 | 6.2.9200.0 lt 6.2.9200.25675 | 6.3.9600.0 lt 6.3.9600.22774 | 6.3.9600.0 lt 6.3.9600.22774
CWE
CWE-190, CWE-190: Integer Overflow or Wraparound
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:00:50.413Z
Updated
2025-09-09T22:38:44.288Z

AI Summary Analysis

Risk verdict

High risk: kernel privilege escalation with local access potential, but no explicit exploitation in the wild indicated by current indicators.

Why this matters

Compromise at kernel level grants total control over the host, enabling persistence, data theft or destructive actions. The breadth of affected Windows versions and architectures means a large portion of enterprise endpoints and some servers are exposed, increasing the window for targeted or opportunistic attacks once an attacker gains local access.

Most likely attack path

An attacker with a valid, low-privilege account on a Windows host could trigger the kernel overflow locally without user interaction, elevating to SYSTEM. The vulnerability’s Scope Changed suggests the impact could extend beyond the initial process. Remote exploitation is unlikely; the route hinges on local access and existing footholds, with potential post-exploitation privilege abuse and lateral movement within the same host.

Who is most exposed

Organizations with mixed Windows 10/11 desktops and Windows Server deployments still running affected builds, including older 1809/2019-era systems and newer Server variants, across x86, x64, ARM64, and Server Core installations.

Detection ideas

  • Logs showing privilege escalation to SYSTEM or 4672-style events.
  • Unusual process creation patterns or token duplication on kernel-heavy processes.
  • Kernel-mode driver load anomalies or unexpected memory/exception events.
  • BSODs or memory fault dumps indicative of kernel misuse.
  • EDR alerts targeting privilege escalation or kernel memory abuse.

Mitigation and prioritisation

  • Apply the Microsoft security updates for all affected builds promptly.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1; otherwise maintain high-priority patching.
  • Enforce least privilege, review admin accounts, enable MFA for privileged access.
  • Enable mitigations such as credential guard, application whitelisting, and kernel-dma protection where feasible.
  • Test patches in staging, update baseline images, and monitor post-deployment for unusual kernel activity.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.