Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54110: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-54110cvecve-2025-54110cwe-190
Published: Tue Sep 09 2025 (09/09/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:32:36 UTC

Technical Analysis

CVE-2025-54110 is an integer overflow vulnerability classified under CWE-190, affecting the Windows 10 Version 1809 kernel (build 10.0.17763.0). The flaw occurs due to improper validation of integer operations within kernel components, leading to an overflow or wraparound condition. This condition can be exploited by an authorized local attacker to escalate privileges from a lower-privileged context to SYSTEM or kernel-level privileges. The vulnerability does not require user interaction and has a low attack complexity, but it does require local access with some privileges. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise. The vulnerability scope is 'changed,' indicating that the exploit affects resources beyond the initially vulnerable component. No public exploits are known yet, but the vulnerability is actively published and tracked. The lack of available patches at the time of disclosure increases the urgency for organizations to implement interim mitigations. The vulnerability is particularly dangerous because kernel-level privilege escalation can bypass many security controls and enable persistent, stealthy attacks.

Potential Impact

For European organizations, the impact of CVE-2025-54110 is substantial. Many enterprises and government agencies still operate legacy Windows 10 1809 systems due to application compatibility or delayed upgrade cycles. Exploitation could allow attackers to gain SYSTEM privileges locally, enabling them to disable security controls, access sensitive data, install persistent malware, or disrupt critical services. This is especially concerning for sectors such as finance, healthcare, energy, and public administration, where data confidentiality and system availability are paramount. The vulnerability could facilitate lateral movement within networks, increasing the risk of widespread compromise. Given the high severity and kernel-level impact, organizations face potential regulatory and compliance repercussions under GDPR if breaches occur. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains high.

Mitigation Recommendations

Organizations should prioritize upgrading affected systems to a supported Windows version where this vulnerability is patched once Microsoft releases an update. Until patches are available, restrict local access to trusted users only, enforce the principle of least privilege, and disable or limit use of accounts with administrative rights on vulnerable systems. Employ endpoint detection and response (EDR) solutions capable of monitoring kernel-level activities and detecting anomalous privilege escalation attempts. Regularly audit and harden system configurations, including applying security baselines and disabling unnecessary services. Network segmentation can limit the impact of a compromised host. Additionally, implement strict application whitelisting and monitor event logs for suspicious behavior indicative of exploitation attempts. Organizations should also maintain up-to-date backups and incident response plans tailored to privilege escalation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545ba23

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 12/23/2025, 9:32:36 PM

Last updated: 2/5/2026, 7:44:22 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats