Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54105: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2025 (Server Core installation)

0
High
VulnerabilityCVE-2025-54105cvecve-2025-54105cwe-362cwe-416
Published: Tue Sep 09 2025 (09/09/2025, 17:01:21 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2025 (Server Core installation)

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:31:19 UTC

Technical Analysis

CVE-2025-54105 is a race condition vulnerability categorized under CWE-362, found in the Microsoft Brokering File System component of Windows Server 2025, specifically affecting the Server Core installation (version 10.0.26100.0). The flaw arises from improper synchronization when multiple threads or processes concurrently access shared resources, leading to a race condition. This condition can be exploited by an attacker with local, low-level privileges to elevate their privileges to higher levels, potentially SYSTEM-level. The vulnerability does not require user interaction but does require local access, and the attack complexity is high due to the need for precise timing and conditions. The CVSS v3.1 score is 7.0, reflecting high impact on confidentiality, integrity, and availability, with attack vector local, attack complexity high, privileges required low, and no user interaction. Exploiting this vulnerability could allow unauthorized modification or control over critical system components, leading to full system compromise. Currently, no public exploits are known, and no patches have been released yet, but the vulnerability is publicly disclosed and should be addressed promptly once mitigations are available.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying Windows Server 2025 Server Core installations in critical infrastructure, financial services, government, and large enterprises. Successful exploitation could lead to unauthorized privilege escalation, allowing attackers to bypass security controls, access sensitive data, disrupt services, or deploy further malware. The high impact on confidentiality, integrity, and availability means that data breaches, service outages, or system takeovers could occur. Given the local access requirement, insider threats or attackers who have gained initial footholds could leverage this vulnerability to escalate privileges and move laterally within networks. This elevates the risk profile for organizations with complex, multi-tiered server environments. The lack of current exploits reduces immediate risk but also means organizations must be proactive in monitoring and patching to prevent future exploitation.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available. 2. Restrict local access to Windows Server 2025 Server Core installations by enforcing strict access controls, limiting administrative privileges, and using just-in-time access models. 3. Employ endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or race condition exploitation behaviors. 4. Harden server configurations by disabling unnecessary services and minimizing the attack surface on Server Core installations. 5. Conduct regular security audits and penetration testing focusing on privilege escalation vectors. 6. Implement robust logging and alerting for local privilege escalation attempts to enable rapid incident response. 7. Use application whitelisting and integrity verification tools to detect unauthorized changes to system files or processes. 8. Educate system administrators and security teams about the vulnerability specifics to improve detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545ba17

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 12/23/2025, 9:31:19 PM

Last updated: 2/7/2026, 4:00:00 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats