CVE Alert: CVE-2025-25004 – Microsoft – Windows 10 Version 1809

CVE-2025-25004

HIGHNo exploitation known

Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.3)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 Version 25H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation), PowerShell 7.4, PowerShell 7.5
Versions
10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.19044.0 lt 10.0.19044.6456 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.19045.0 lt 10.0.19045.6456 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26200.0 lt 10.0.26200.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.10240.0 lt 10.0.10240.21161 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 6.0.6003.0 lt 6.0.6003.23571 | 6.0.6003.0 lt 6.0.6003.23571 | 6.1.7601.0 lt 6.1.7601.27974 | 6.1.7601.0 lt 6.1.7601.27974 | 6.2.9200.0 lt 6.2.9200.25722 | 6.2.9200.0 lt 6.2.9200.25722 | 6.3.9600.0 lt 6.3.9600.22824 | 6.3.9600.0 lt 6.3.9600.22824 | 7.4.0 lt 7.4.13 | 7.5.0 lt 7.5.4
CWE
CWE-284, CWE-284: Improper Access Control
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-10-14T17:00:54.227Z
Updated
2025-10-14T19:38:52.560Z

AI Summary Analysis

Risk verdict

High-severity local privilege escalation potential; exploitation is not shown as active in SSVC data, but a patch is available and should be applied promptly.

Why this matters

If an attacker gains local access and lures user interaction, they can elevate privileges to full control on the host, risking data integrity and enabling lateral movement within the environment. PowerShell is widely used in enterprise Windows deployments, so the impact could be broad across endpoints and servers if unpatched.

Most likely attack path

  • Attacker already has local access (low barrier with existing user credentials or compromised workstation).
  • They trigger PowerShell-based actions that exploit the local-privilege escalation vector, aided by low privileges required and user interaction.
  • Successful escalation yields high-impact access on the host, enabling further actions such as credential access or remote footholds.

Who is most exposed

Organisations with Windows endpoints and servers running PowerShell (including PowerShell Remoting enabled or automation tasks) are most at risk, particularly where patching cadence is slow or controls over PowerShell usage are weak.

Detection ideas

  • Monitor for PowerShell activity with encoded commands or base64 payloads (e.g., -EncodedCommand, -NoLogo).
  • Flag PowerShell processes spawned by non-administrative processes or unusual parent processes, especially with elevated privileges.
  • Detect abnormal privilege-escalation events or token/rights changes and suspicious scheduled tasks or services created via PowerShell.
  • Look for anomalous PowerShell activity during off-hours or from hosts lacking standard admin activity.

Mitigation and prioritisation

  • Apply the official fix to all affected Windows builds as a matter of urgency.
  • Enable strict PowerShell governance (Constrained Language Mode, WDAC/AppLocker, disable or tightly control Remoting).
  • Rotate credentials and review privilege assignments; restrict privilege escalation paths.
  • Plan patch rollout in a staged change window; test in a lab before broad deployment.
  • If KEV or EPSS data indicate higher urgency, elevate to priority 1; otherwise treat as priority 2 due to high impact but local-exploitation prerequisites.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.