CVE Alert: CVE-2025-55335 – Microsoft – Windows 10 Version 1809

CVE-2025-55335

HIGHNo exploitation known

Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally.

CVSS v3.1 (7.4)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation), Windows 11 Version 25H2
Versions
10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.19044.0 lt 10.0.19044.6456 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.19045.0 lt 10.0.19045.6456 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.10240.0 lt 10.0.10240.21161 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 6.0.6003.0 lt 6.0.6003.23571 | 6.0.6003.0 lt 6.0.6003.23571 | 6.1.7601.0 lt 6.1.7601.27974 | 6.1.7601.0 lt 6.1.7601.27974 | 6.2.9200.0 lt 6.2.9200.25722 | 6.2.9200.0 lt 6.2.9200.25722 | 6.3.9600.0 lt 6.3.9600.22824 | 6.3.9600.0 lt 6.3.9600.22824 | 10.0.26200.0 lt 10.0.26200.6899
CWE
CWE-416, CWE-416: Use After Free
Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-10-14T17:00:14.740Z
Updated
2025-10-14T23:55:08.803Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation; patch promptly for affected Windows versions.

Why this matters

An attacker who can run code on an vulnerable host could use the NTFS use-after-free flaw to elevate to SYSTEM, enabling full control, credential access, and persistence. The impact is local, but the resulting compromise can enable broader enterprise access and data exposure if multiple hosts are affected or central services are reachable.

Most likely attack path

Exploitation requires local access with no user interaction and no privileges required, but high complexity to trigger the condition. A foothold on a machine (malware, removable media, or compromised admin workflow) could abuse NTFS operations to gain SYSTEM, then pivot to sensitive assets or create persistence. Lateral movement would depend on subsequent credential access and network reach.

Who is most exposed

Endpoints and servers running the affected Windows variants, including client desktops and Server editions in mixed environments, are most at risk, particularly where patch cadence is slower or devices remain on older builds.

Detection ideas

  • Kernel crashes or memory-corruption indicators in NTFS drivers; collect crash dumps for ntfs.sys.
  • Unusual or failed NTFS operations followed by rapid privilege changes or process spawning at SYSTEM level.
  • New or unexpected SYSTEM-level processes, services, or scheduled tasks shortly after NTFS activity.
  • Anomalous security agent or EDR alerts tied to kernel-mode abuse or privilege escalation attempts.
  • Post-exploitation LPE patterns: credential access attempts, unusual NTLM/kerberos activity.

Mitigation and prioritisation

  • Apply the vendor-supplied patches to all affected builds (Windows 10 1809, Server 2019, 2022, 2025 and related editions).
  • Verify patch deployment via patch management tooling; reboot as required.
  • Strengthen defence-in-depth: restrict local account usage, enforce least-privilege, enable memory integrity/ASLR, and harden NTFS access controls.
  • Monitor and alert on kernel-mode anomalies and SYSTEM-level process creation; prioritise patch rollout in high-risk environments.
  • Plan a rapid patch window with testing in a non-production cohort before full organisation-wide deployment.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features