Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54918: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-54918cvecve-2025-54918cwe-287
Published: Tue Sep 09 2025 (09/09/2025, 17:01:00 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:39:52 UTC

Technical Analysis

CVE-2025-54918 is a vulnerability classified under CWE-287 (Improper Authentication) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the NTLM authentication protocol implementation, allowing an attacker who already has some level of authorized network access and low privileges to bypass proper authentication checks and elevate their privileges. This elevation can lead to unauthorized access to sensitive resources, potentially allowing the attacker to execute arbitrary code with higher privileges, manipulate system configurations, or disrupt system availability. The CVSS v3.1 score of 8.8 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), and no requirement for user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) and requires only low privileges (PR:L) to exploit. No public exploits are known yet, but the vulnerability is published and should be treated as a critical risk for affected systems. The lack of available patches at the time of reporting increases the urgency for mitigation through alternative controls. NTLM is known for legacy compatibility but is less secure than modern authentication protocols, making this vulnerability particularly concerning in environments where NTLM is still in use. The vulnerability's network-based nature means it can be exploited remotely within an organization's network or potentially via VPN connections, increasing the attack surface.

Potential Impact

For European organizations, the impact of CVE-2025-54918 can be severe. Many enterprises and public sector entities still operate legacy Windows 10 Version 1809 systems due to application compatibility or delayed upgrade cycles. Successful exploitation could lead to privilege escalation, enabling attackers to gain administrative control over affected systems. This can result in data breaches, disruption of critical services, and lateral movement within networks. Confidential data, including personal data protected under GDPR, could be exposed, leading to regulatory penalties and reputational damage. Critical infrastructure sectors such as finance, healthcare, energy, and government are particularly vulnerable due to their reliance on Windows environments and the potential high value of compromised systems. The network-based attack vector means that attackers could exploit this vulnerability remotely, increasing the risk of widespread impact within interconnected enterprise networks. The absence of known exploits in the wild currently provides a window for proactive defense, but the high severity score indicates that exploitation would have significant consequences.

Mitigation Recommendations

Given the absence of an official patch at the time of reporting, European organizations should implement a multi-layered mitigation strategy: 1) Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version to eliminate the vulnerability. 2) Restrict or disable NTLM authentication where possible, transitioning to more secure protocols like Kerberos. 3) Implement network segmentation to limit the ability of attackers to move laterally after initial compromise. 4) Enforce the principle of least privilege rigorously to reduce the impact of privilege escalation. 5) Monitor authentication logs and network traffic for unusual NTLM authentication attempts or privilege escalation indicators. 6) Use endpoint detection and response (EDR) tools to detect suspicious activity related to privilege escalation. 7) Apply strict access controls on sensitive systems and services to reduce exposure. 8) Educate IT staff about the vulnerability and ensure rapid incident response capabilities are in place. These measures collectively reduce the attack surface and limit the potential damage until a patch is available and deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-31T18:54:19.614Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e3ce6ed8307545ba8e

Added to database: 9/9/2025, 6:28:51 PM

Last enriched: 12/23/2025, 9:39:52 PM

Last updated: 2/7/2026, 7:13:12 AM

Views: 474

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats