CVE Alert: CVE-2025-54091 – Microsoft – Windows 10 Version 1809

CVE-2025-54091

HIGHNo exploitation known

Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.10240.0 lt 10.0.10240.21128 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 6.2.9200.0 lt 6.2.9200.25675 | 6.2.9200.0 lt 6.2.9200.25675 | 6.3.9600.0 lt 6.3.9600.22774 | 6.3.9600.0 lt 6.3.9600.22774
CWE
CWE-190, CWE-190: Integer Overflow or Wraparound
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:01:17.742Z
Updated
2025-09-09T22:39:09.206Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation via Hyper-V; exploitation is not observed in the wild based on SSVC/ADP data, but the total impact potential warrants prompt patching.

Why this matters

If exploited, an attacker could gain SYSTEM-level control on the host and compromise connected VMs, risking data integrity, availability, and confidentiality across the virtualised estate. The ability to escalate privileges locally may enable further lateral movement within a data centre or cloud-hosted Hyper‑V deployment, with potential to disrupt production.

Most likely attack path

Attacker requires local access and existing user privileges (PR:L) with no user interaction (UI:N). The flaw leverages a Hyper‑V memory/overflow condition to elevate privileges (CWE-190/122 with total impact), so exploitation would occur on the host or via a VM escape scenario. Initial access is not remote; success concentrates control on the affected host, enabling broader host-VM compromise if other trust boundaries exist.

Who is most exposed

Environments running Hyper‑V on Windows Server 2019/2022 and consumer/professional Windows builds with Hyper‑V enabled are most at risk, particularly data-centre hosts, cloud hypervisors, and organisations with legacy 1809/21H2 deployments still in use.

Detection ideas

  • Privilege-escalation or unusual SYSTEM/hypervisor service activity in Windows Security logs.
  • Unexplained Hyper‑V or virtualization-related process starts, crashes, or memory-corruption dumps.
  • Anomalous guest-to-host interactions or hypervisor calls; unexpected memory/heap events.
  • Indicators in monitoring tools of failed or blocked patch attempts; missing patch KBs.

Mitigation and prioritisation

  • Apply the Microsoft security updates addressing CVE-2025-54091 to all affected builds.
  • Verify patch deployment across Hyper‑V hosts and guest VMs; enforce patching in the next maintenance window.
  • If patching is delayed, reduce exposure by minimising unnecessary Hyper‑V surface area, disabling unused guest-to-host pathways, and tightening admin/privilege access on hosts.
  • Enable relevant security mitigations and monitor Hyper‑V and host integrity logs for escalation signals.
  • Change-management: test patches in staging, communicate timelines, and resume normal operations after verification.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.