CVE Alert: CVE-2025-53801 – Microsoft – Windows 10 Version 1809

CVE-2025-53801

HIGHNo exploitation known

Untrusted pointer dereference in Windows DWM allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.10240.0 lt 10.0.10240.21128 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422
CWE
CWE-822, CWE-822: Untrusted Pointer Dereference
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:01:11.638Z
Updated
2025-09-09T19:23:26.879Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation on affected Windows builds; patching is urgent to mitigate potential exploitation.

Why this matters

If exploited, an attacker can elevate to SYSTEM on a compromised host, enabling full control, data exposure and persistence. Widespread impact could enable attackers to seed post-exploitation tools across endpoints before detection.

Most likely attack path

Preconditions: local access with at least low privileges; no user interaction required. The flaw enables an untrusted pointer dereference in the DWM core library, allowing privilege escalation from a standard user to high-privilege context. With SYSTEM access, an attacker could install backdoors, harvest credentials and move to additional processes on the same machine.

Who is most exposed

Enterprise endpoints running affected Windows 10/11 and Windows Server versions are at risk, including laptops, desktops and servers deployed in corporate networks or remote‑access environments.

Detection ideas

  • Unexpected DWM crashes or memory corruption events on affected builds.
  • Unusual, high-privilege process creation or token changes from non-admin accounts.
  • Event log spikes for privilege-escalation attempts without user interaction.
  • Anomalous DLL or module loading associated with DWM.
  • Patch compliance checks showing missing Microsoft updates for these SKUs.

Mitigation and prioritisation

  • Deploy the official Microsoft fix as soon as possible; verify deployment via patch management.
  • Enforce least-privilege on local accounts; restrict unnecessary DWM access where feasible.
  • Enable robust EDR/UEBA monitoring for local privilege escalation indicators.
  • Schedule testing in a controlled window before broad rollout; ensure backup and rollback plans.
  • Maintain up-to-date endpoint protections and enforce timely patching; treat as priority due to high impact potential.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.