CVE Alert: CVE-2025-54093 – Microsoft – Windows 10 Version 1809

CVE-2025-54093

HIGHNo exploitation known

Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally.

CVSS v3.1 (7)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.19044.0 lt 10.0.19044.6332 | 10.0.22621.0 lt 10.0.22621.5909 | 10.0.19045.0 lt 10.0.19045.6332 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.22631.0 lt 10.0.22631.5909 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.10240.0 lt 10.0.10240.21128 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 6.0.6003.0 lt 6.0.6003.23529 | 6.0.6003.0 lt 6.0.6003.23529 | 6.0.6003.0 lt 6.0.6003.23529 | 6.1.7601.0 lt 6.1.7601.27929 | 6.1.7601.0 lt 6.1.7601.27929 | 6.2.9200.0 lt 6.2.9200.25675 | 6.2.9200.0 lt 6.2.9200.25675 | 6.3.9600.0 lt 6.3.9600.22774 | 6.3.9600.0 lt 6.3.9600.22774
CWE
CWE-367, CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:01:18.982Z
Updated
2025-09-10T03:55:37.828Z

AI Summary Analysis

Risk verdict

High-severity local privilege escalation in the Windows TCP/IP driver; exploitation not currently observed in available indicators, but patching should be prioritised when feasible.

Why this matters

The TOCTOU race can let an authorised local user elevate to SYSTEM, enabling full control, potential data exposure, and persistence. With a high impact on confidentiality, integrity and availability, an attacker could weaponise this as a foothold for broader compromise across hosts.

Most likely attack path

Requires local access (AV:L) and low privileges (PR:L) with no user interaction (UI:N). An attacker would trigger a race in tcpip.sys to obtain elevated rights, then attempt post-exploitation actions. Lateral movement remains possible once SYSTEM is reached, subject to existing network and credential hygiene.

Who is most exposed

Widespread across enterprise endpoints and servers running the affected Windows versions (desktop and Server editions listed), particularly where local accounts or remote management interfaces are present and patch levels are lagging.

Detection ideas

  • Look for Privilege Escalation events (e.g., 4672) from non-admin processes.
  • Monitor unusual process creations or token changes (4688 with elevated tokens).
  • Track tcpip.sys driver load/crash events or abnormal kernel-mode abnormalities.
  • Correlate spikes in CPU or memory activity tied to network stack moments.

Mitigation and prioritisation

  • Apply the Microsoft fix to all affected Windows versions; verify deployment across devices.
  • Enforce least privilege and reduce local admin rights; review group memberships.
  • Strengthen endpoint security monitoring (EDR) for privilege escalations and kernel faults.
  • Enable driver integrity checks and consider WDAC/Code Integrity where feasible.
  • Schedule patching in a coordinated maintenance window with rollback and testing.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.