Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53809: CWE-20: Improper Input Validation in Microsoft Windows 11 Version 24H2

0
Medium
VulnerabilityCVE-2025-53809cvecve-2025-53809cwe-20
Published: Tue Sep 09 2025 (09/09/2025, 17:01:16 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 24H2

Description

Improper input validation in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:19:44 UTC

Technical Analysis

CVE-2025-53809 is a vulnerability identified in Microsoft Windows 11 Version 24H2, specifically within the Local Security Authority Subsystem Service (LSASS). The root cause is improper input validation (classified under CWE-20), which allows an attacker who is authorized and has network access to the affected system to trigger a denial of service condition. LSASS is a critical Windows component responsible for enforcing security policies, handling authentication, and managing user logins. Improper input validation means that LSASS does not correctly verify or sanitize certain inputs it receives over the network, which can be exploited to cause the service to crash or become unresponsive. The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:L), and does not require user interaction (UI:N). The impact is limited to availability (A:H), with no impact on confidentiality or integrity. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not extend privileges or affect other components. No known exploits are currently reported in the wild, but the vulnerability could be leveraged to disrupt service availability, potentially impacting authentication services and system stability. No patches were linked at the time of reporting, so organizations should monitor for updates from Microsoft and prepare to deploy them promptly.

Potential Impact

The primary impact of CVE-2025-53809 is a denial of service condition affecting the LSASS service on Windows 11 Version 24H2 systems. Since LSASS is central to authentication and security policy enforcement, its disruption can cause system instability, prevent user logins, and potentially lead to broader service outages on affected machines. For organizations, this can translate into downtime, loss of productivity, and disruption of critical services, especially in environments relying heavily on Windows 11 24H2 for endpoint security and user authentication. Although the vulnerability does not allow data theft or privilege escalation, the availability impact can be significant in enterprise, government, and critical infrastructure sectors where continuous authentication services are essential. Attackers with authorized network access and limited privileges could exploit this vulnerability to disrupt operations, potentially as part of a larger attack or to cause targeted disruption. The lack of user interaction requirement increases the risk of automated or remote exploitation. Given the widespread adoption of Windows 11 in corporate environments, the scope of affected systems is substantial, making timely mitigation important to prevent service interruptions.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Restrict network access to LSASS-related services and ports using network segmentation, firewalls, and access control lists to limit exposure to authorized users only. 3. Implement strict privilege management to ensure that only trusted and necessary accounts have network access privileges that could exploit this vulnerability. 4. Employ network intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous traffic patterns targeting LSASS or related authentication services. 5. Conduct regular system and security audits to detect unusual service crashes or authentication failures that could indicate exploitation attempts. 6. Consider deploying endpoint detection and response (EDR) solutions capable of identifying and alerting on LSASS service disruptions or suspicious activity. 7. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation is suspected. 8. In environments where patching may be delayed, consider temporary workarounds such as isolating vulnerable systems from untrusted networks or disabling unnecessary network services that interact with LSASS.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T13:40:07.628Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e1ce6ed8307545b9c4

Added to database: 9/9/2025, 6:28:49 PM

Last enriched: 2/21/2026, 9:19:44 PM

Last updated: 3/25/2026, 12:07:10 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses