Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54110: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-54110cvecve-2025-54110cwe-190
Published: Tue Sep 09 2025 (09/09/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:24:52 UTC

Technical Analysis

CVE-2025-54110 is an integer overflow or wraparound vulnerability classified under CWE-190, found in the Windows Kernel of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw arises when the kernel improperly handles integer values, causing arithmetic operations to overflow or wrap around, which can lead to memory corruption or logic errors. An authorized attacker with local access and limited privileges can exploit this vulnerability to escalate their privileges to SYSTEM level, thereby gaining full control over the affected system. The vulnerability does not require user interaction and has a low attack complexity, making exploitation feasible for attackers with local access. The scope of impact is significant as it affects confidentiality, integrity, and availability of the system, potentially allowing attackers to execute arbitrary code, install malware, or disrupt system operations. Although no exploits have been observed in the wild yet, the vulnerability poses a serious risk to legacy Windows 10 systems that remain in use, especially in environments where patching is delayed or unsupported. The lack of available patches at the time of publication increases the urgency for mitigation through system upgrades or other defensive measures. This vulnerability highlights the risks associated with running outdated operating systems and the importance of maintaining up-to-date security posture.

Potential Impact

The impact of CVE-2025-54110 is severe for organizations still operating Windows 10 Version 1507. Successful exploitation allows attackers to elevate privileges locally to SYSTEM level, granting full control over the affected machine. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of critical services, and potential lateral movement within enterprise networks. The compromise of kernel-level privileges undermines all security controls on the system, making detection and remediation more difficult. Organizations relying on legacy Windows 10 systems in critical infrastructure, government, healthcare, or financial sectors face heightened risks due to the potential for data breaches, operational downtime, and regulatory non-compliance. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the risk, especially as exploit code may be developed and weaponized in the future. The vulnerability also emphasizes the broader risk of unsupported operating systems that no longer receive security updates, increasing exposure to advanced persistent threats and insider attacks.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately feasible, implement strict access controls to limit local user privileges and reduce the attack surface. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation attempts. 4. Regularly audit and restrict administrative accounts to minimize the number of users with elevated privileges. 5. Use virtualization or sandboxing to isolate legacy systems where possible, reducing exposure to critical assets. 6. Monitor security advisories from Microsoft for the release of patches or workarounds addressing this vulnerability. 7. Conduct user training to prevent unauthorized local access and enforce strong physical security controls. 8. Maintain comprehensive backups and incident response plans to quickly recover from potential compromises. These steps go beyond generic advice by focusing on legacy system management, privilege restriction, and proactive monitoring tailored to the specific nature of this kernel-level integer overflow.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545ba23

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 2/21/2026, 9:24:52 PM

Last updated: 3/26/2026, 3:02:05 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses