Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54116: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-54116cvecve-2025-54116cwe-284
Published: Tue Sep 09 2025 (09/09/2025, 17:01:26 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows MultiPoint Services allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 10/02/2025, 00:50:02 UTC

Technical Analysis

CVE-2025-54116 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1809, specifically build 10.0.17763.0. The vulnerability resides in Windows MultiPoint Services, a feature designed to enable multiple users to simultaneously share one computer, commonly used in educational and enterprise environments. The flaw allows an authorized attacker with limited privileges to locally elevate their privileges, potentially gaining higher-level access than intended. The CVSS 3.1 base score of 7.3 reflects a high severity, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), and privileges already present but limited (PR:L). User interaction is required (UI:R), and the scope remains unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation can lead to full system compromise, data theft, or disruption. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on vendor updates or workarounds once available. The vulnerability’s improper access control nature means that the system fails to enforce correct permission checks, allowing privilege escalation from a lower-privileged user to higher privileges, which could be exploited to execute arbitrary code or access sensitive information.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors relying on Windows 10 Version 1809 in environments where MultiPoint Services is deployed, such as educational institutions, government offices, and enterprises using shared computing resources. Successful exploitation could allow attackers to bypass security controls, leading to unauthorized access to sensitive data, disruption of services, or lateral movement within networks. Given the high impact on confidentiality, integrity, and availability, organizations could face data breaches, operational downtime, and compliance violations under regulations like GDPR. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as insider threats or malware that gains initial foothold could leverage this vulnerability to escalate privileges and deepen compromise.

Mitigation Recommendations

Organizations should prioritize upgrading or patching affected systems once Microsoft releases an official fix. In the interim, practical mitigations include disabling Windows MultiPoint Services if not required, restricting local user permissions to the minimum necessary, and enforcing strict user account control policies to limit privilege escalation opportunities. Monitoring and logging local user activities can help detect suspicious attempts to exploit privilege escalation. Employing endpoint protection solutions with behavioral detection capabilities may also help identify exploitation attempts. Additionally, organizations should ensure that all users follow the principle of least privilege and that multi-factor authentication is enforced for sensitive accounts to reduce the risk of initial compromise that could lead to exploitation of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.441Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e3ce6ed8307545ba48

Added to database: 9/9/2025, 6:28:51 PM

Last enriched: 10/2/2025, 12:50:02 AM

Last updated: 10/29/2025, 9:42:08 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats