Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54916: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-54916cvecve-2025-54916cwe-121
Published: Tue Sep 09 2025 (09/09/2025, 17:01:00 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:39:26 UTC

Technical Analysis

CVE-2025-54916 is a stack-based buffer overflow vulnerability identified in the NTFS file system driver of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises due to improper handling of input data within the NTFS driver, leading to a buffer overflow on the stack. An attacker with authorized local access and limited privileges can exploit this flaw to execute arbitrary code in kernel mode, potentially escalating privileges and gaining full control over the affected system. The vulnerability does not require user interaction, increasing its risk profile. The CVSS v3.1 score of 7.8 indicates high severity, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H showing that the attack requires local access but low complexity and privileges, no user interaction, and impacts confidentiality, integrity, and availability severely. No public exploits or patches have been reported at the time of publication, but the vulnerability's nature suggests it could be leveraged for privilege escalation or persistence by attackers. The affected product is specifically Windows 10 Version 1809, which is an older release that may still be in use in some enterprise environments. The vulnerability is categorized under CWE-121, a common weakness related to stack-based buffer overflows, which are often exploited to execute arbitrary code or cause denial of service. Given the NTFS driver’s critical role in file system operations, exploitation could lead to system crashes or full system compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those still operating legacy Windows 10 Version 1809 systems. Successful exploitation could allow attackers to escalate privileges locally, bypass security controls, and execute arbitrary code with kernel-level permissions. This jeopardizes the confidentiality of sensitive data, the integrity of system operations, and the availability of critical services. Sectors such as government, finance, healthcare, and critical infrastructure that rely on Windows 10 1809 may face operational disruptions or data breaches. The lack of a patch increases the window of exposure, and while no exploits are known in the wild, the vulnerability’s characteristics make it a likely target for attackers seeking persistence or lateral movement within networks. European organizations with strict compliance requirements may also face regulatory and reputational consequences if exploited.

Mitigation Recommendations

1. Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls and monitoring for unauthorized local logins. 2. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 3. Disable or limit NTFS-related operations for untrusted users or processes where feasible. 4. Prioritize upgrading affected systems to a supported and patched Windows version to eliminate exposure to this vulnerability. 5. Monitor security advisories from Microsoft closely for the release of official patches or workarounds and apply them immediately upon availability. 6. Conduct regular vulnerability assessments and penetration testing focusing on local privilege escalation vectors. 7. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and the importance of maintaining updated systems. 8. Employ network segmentation to limit the impact of a compromised endpoint and prevent lateral movement.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-31T18:54:19.613Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e3ce6ed8307545ba88

Added to database: 9/9/2025, 6:28:51 PM

Last enriched: 12/23/2025, 9:39:26 PM

Last updated: 2/7/2026, 11:24:24 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats