Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54110: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-54110cvecve-2025-54110cwe-190
Published: Tue Sep 09 2025 (09/09/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 10/02/2025, 00:48:36 UTC

Technical Analysis

CVE-2025-54110 is a high-severity integer overflow or wraparound vulnerability identified in the Windows Kernel of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability stems from improper handling of integer values within kernel-level code, specifically allowing an integer overflow or wraparound condition. This flaw can be exploited by an authorized local attacker—meaning the attacker must have some level of access to the system but not necessarily administrative privileges—to escalate their privileges to SYSTEM level. The vulnerability is classified under CWE-190, which covers integer overflow or wraparound issues that can lead to unexpected behavior such as memory corruption or bypassing security checks. The CVSS v3.1 base score is 8.8, indicating a high severity with a vector of AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, meaning the attack requires local access, low complexity, low privileges, no user interaction, and results in complete confidentiality, integrity, and availability compromise with scope change. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, given the nature of kernel vulnerabilities and the potential for privilege escalation, this vulnerability represents a significant risk to affected systems. The vulnerability affects Windows 10 Version 1809, which is an older but still in-use version of Windows 10, often found in enterprise environments that have not upgraded to newer releases.

Potential Impact

For European organizations, this vulnerability poses a critical risk primarily due to the potential for local privilege escalation, which can be leveraged by attackers who have gained limited access to a system to gain full control. This can lead to unauthorized access to sensitive data, disruption of services, and deployment of further malware or ransomware. Many European enterprises, government agencies, and critical infrastructure operators still run legacy Windows 10 versions like 1809 due to compatibility or operational constraints, increasing their exposure. The compromise of confidentiality, integrity, and availability at the kernel level can facilitate lateral movement within networks, data exfiltration, and sabotage of critical systems. Given the high level of data protection regulation in Europe (e.g., GDPR), such breaches could also result in significant legal and financial penalties. Additionally, the lack of a patch at the time of publication means organizations must rely on other mitigations until an official fix is released, increasing the window of vulnerability.

Mitigation Recommendations

European organizations should immediately conduct an inventory to identify systems running Windows 10 Version 1809 and assess their exposure. Until a patch is available, organizations should enforce strict local access controls, limiting user privileges to the minimum necessary and monitoring for unusual local activity indicative of privilege escalation attempts. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous kernel-level behavior. Network segmentation should be enhanced to restrict lateral movement from potentially compromised endpoints. Organizations should also implement application whitelisting and restrict the execution of untrusted code. Regularly review and tighten group policies related to user rights assignments. Once Microsoft releases a patch, prioritize its deployment, especially on systems with sensitive data or critical functions. Additionally, consider upgrading affected systems to a supported and patched Windows version to reduce exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545ba23

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 10/2/2025, 12:48:36 AM

Last updated: 10/30/2025, 4:03:31 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats