Skip to main content

CVE-2025-54110: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-54110cvecve-2025-54110cwe-190
Published: Tue Sep 09 2025 (09/09/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 09/09/2025, 18:41:26 UTC

Technical Analysis

CVE-2025-54110 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw is classified under CWE-190, which pertains to integer overflow or wraparound issues. Specifically, this vulnerability exists within the Windows Kernel, the core component responsible for managing system resources and hardware interactions. An integer overflow or wraparound occurs when an arithmetic operation attempts to create a numeric value that exceeds the maximum size the integer type can hold, causing it to wrap around to a much smaller value or zero. In kernel code, such errors can lead to improper memory handling, potentially allowing an attacker to manipulate kernel memory structures or bypass security checks. The vulnerability allows an authorized attacker—meaning one with local access and limited privileges—to escalate their privileges to SYSTEM or kernel-level, thereby gaining full control over the affected system. The CVSS v3.1 base score is 8.8, indicating a high severity with significant impact on confidentiality, integrity, and availability. The vector details specify that the attack requires local access (AV:L), low attack complexity (AC:L), and privileges at a limited level (PR:L), but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact metrics are high for confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. This vulnerability is critical for environments still running Windows 10 Version 1809, which is an older release but may still be in use in some organizations due to legacy application dependencies or delayed upgrade cycles.

Potential Impact

For European organizations, the impact of CVE-2025-54110 is significant. The ability for a local attacker to escalate privileges to SYSTEM level can lead to full compromise of affected endpoints, allowing installation of persistent malware, data exfiltration, lateral movement within networks, and disruption of critical services. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened risks of data breaches and regulatory penalties. Legacy systems running Windows 10 Version 1809 are particularly vulnerable, and these may be prevalent in industrial control systems, public sector institutions, or smaller enterprises with limited IT modernization budgets. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score indicates that once exploits become available, rapid exploitation could occur. The vulnerability also poses risks to supply chain security if compromised endpoints are used to access or manage critical infrastructure or sensitive data repositories.

Mitigation Recommendations

1. Immediate inventory and identification of all systems running Windows 10 Version 1809 within the organization. 2. Prioritize upgrading or migrating these systems to a supported and patched version of Windows 10 or Windows 11, as Microsoft typically discontinues security updates for older versions. 3. In the absence of an official patch, implement strict local access controls to limit the number of users with local login capabilities, especially those with limited privileges that could be leveraged for escalation. 4. Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or kernel-level anomalies. 5. Harden system configurations by disabling unnecessary local accounts and services that could be exploited. 6. Enforce application whitelisting and use least privilege principles to reduce the attack surface. 7. Regularly audit and review logs for signs of suspicious activity related to privilege escalation. 8. Prepare incident response plans specifically addressing potential exploitation of kernel vulnerabilities. 9. Engage with Microsoft support channels to obtain any out-of-band patches or mitigations as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545ba23

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 9/9/2025, 6:41:26 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats