CVE Alert: CVE-2025-53805 – Microsoft – Windows Server 2022

CVE-2025-53805

HIGHNo exploitation known

Out-of-bounds read in Windows Internet Information Services allows an unauthorized attacker to deny service over a network.

CVSS v3.1 (7.5)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows Server 2022, Windows 11 version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025
Versions
10.0.20348.0 lt 10.0.20348.4171 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584
CWE
CWE-125, CWE-125: Out-of-bounds Read
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:01:13.983Z
Updated
2025-09-09T19:23:29.428Z

AI Summary Analysis

Risk verdict

High severity DoS risk from a network-accessible HTTP.sys flaw; no exploitation activity is evidenced at present, but remote triggering could disrupt services if unpatched.

Why this matters

Unauthenticated remote access can trigger an out-of-bounds read, potentially crashing web services and IIS-dependent apps. For organisations hosting public or hybrid web workloads, outages translate to downtime, SLA penalties, and reputational impact, especially where HTTP.sys is exposed.

Most likely attack path

An attacker sends crafted network traffic to a vulnerable Windows host running affected IIS/HTTP.sys. No user interaction or prior privileges are required; exploitation would cause a denial of service on the target host, with limited or no lateral movement beyond the compromised server until remediation.

Who is most exposed

Entities running Windows Server 2022/2025 or Windows 11 variants with IIS/public web endpoints are at risk, particularly where servers are reachable from the internet or shared networks. Typical exposure includes on-premise data centres and cloud-hosted VMs hosting web services.

Detection ideas

  • Spikes in CPU/memory usage or crashes for HTTP.sys/IIS processes.
  • Crash dumps and Event Viewer entries referencing HTTP.sys or out-of-bounds reads.
  • Sudden increases in 503 errors or service restarts of webfront-end services.
  • Unusual inbound traffic to port 80/443 without corresponding legitimate activity.
  • Patch state showing systems unpatched against the CVE.

Mitigation and prioritisation

  • Apply the latest Microsoft security updates to affected OS versions; verify patch level across all servers.
  • Restrict external access to HTTP.sys/endpoints via firewalls or API gateways; enable least-privilege exposure.
  • Enable enhanced logging and crash-dump collection for rapid triage; test in a staging environment before broad rollout.
  • Implement a short-change-change window for patching with fallback to validated restore points if issues arise.
  • If KEV/EPSS indicators were present, escalate accordingly; with current data, treat as a high-priority mitigation task but not necessarily Priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.