CVE Alert: CVE-2025-54111 – Microsoft – Windows 10 Version 1809

CVE-2025-54111

HIGHNo exploitation known

Use after free in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.10240.0 lt 10.0.10240.21128 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422
CWE
CWE-416, CWE-416: Use After Free
Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:00:51.074Z
Updated
2025-09-09T22:38:44.825Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation; exploitability currently not observed in the wild, but impact on system integrity and confidentiality is severe if leveraged.

Why this matters

An attacker with local access could elevate to higher privileges and compromise data assets or persistence across the host. Because the flaw affects core UI logic, successful exploitation could enable full control of the machine, undermining endpoint security and enabling lateral movement to adjacent systems.

Most likely attack path

Preconditions: local access with low privileges, no user interaction required to trigger the vulnerability, and the attacker being able to execute code on the host. Once triggered, the use-after-free condition can grant elevated rights and persist (due to Scope: the impact affects broader system state). With high impact on all three CIA facets, an attacker could directly reach administrator-level operations and then attempt lateral movement via compromised accounts or services.

Who is most exposed

Widely deployed Windows endpoints across organisations: desktop fleets on Windows 10/11 (multiple versions) and Windows Server instances in enterprise environments. Devices still running older images (where patches exist) are particularly at risk absent timely updates.

Detection ideas

  • Unexplained privilege escalations or new high-privilege processes originating from UI-related components.
  • Sudden crashes or memory-corruption events tied to UI frameworks (XAML/UIA paths).
  • Anomalous token privilege changes or unusual service/process launches after user or system events.
  • Memory dumps or Sysmon-like signs of use-after-free patterns in UI processes.
  • Elevated activity without corresponding user input or authentication events.

Mitigation and prioritisation

  • Apply Microsoft security updates to all affected Windows 10/11 and Server builds; verify patch compliance.
  • Enforce least privilege, monitor for privilege escalations, and deploy endpoint detection for memory/privilege abuse.
  • Enable and tune EDR/AV to flag suspicious UI-process activity and local execution hops.
  • Use application allow-listing and network segmentation to limit post-exploit movement.
  • Plan a staged patch rollout with testing and rollback procedures; coordinate change management to minimise disruption.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.