Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55234: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-55234cvecve-2025-55234cwe-287
Published: Tue Sep 09 2025 (09/09/2025, 17:01:32 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA. Adopt appropriate SMB Server hardening measures.

AI-Powered Analysis

AILast updated: 11/27/2025, 04:34:05 UTC

Technical Analysis

CVE-2025-55234 is a vulnerability classified under CWE-287 (Improper Authentication) affecting the SMB Server component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows attackers to perform relay attacks by exploiting insufficient authentication mechanisms in SMB Server configurations. Relay attacks involve intercepting and relaying authentication messages between a client and server to gain unauthorized access or elevate privileges. Although SMB Server supports hardening features such as SMB Server signing and Extended Protection for Authentication (EPA), these are not always enabled by default or may be incompatible with some environments. Microsoft’s September 2025 security updates introduce audit capabilities that allow administrators to assess their SMB Server configurations and detect potential vulnerabilities or incompatibilities before enforcing hardening measures. The vulnerability has a CVSS v3.1 score of 8.8 (high severity), indicating network exploitable (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact includes full compromise of confidentiality, integrity, and availability through elevation of privilege attacks. No known exploits are currently reported in the wild, but the risk remains significant due to the widespread use of SMB and Windows 10 1809 in enterprise environments. The vulnerability underscores the importance of enabling SMB signing and EPA to prevent relay attacks and protect authentication integrity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to enterprise networks relying on Windows 10 Version 1809, especially those using SMB for file sharing and authentication. Successful exploitation can lead to unauthorized access, privilege escalation, and potential lateral movement within networks, compromising sensitive data and critical systems. This can disrupt business operations, lead to data breaches, and cause regulatory compliance issues under GDPR due to potential exposure of personal data. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable given their reliance on SMB and the high value of their data. The ease of exploitation without privileges and the network attack vector increase the likelihood of targeted attacks or opportunistic exploitation. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score indicates that once exploited, the impact would be severe. Failure to implement SMB hardening measures could result in widespread compromise across European enterprises still running this Windows version.

Mitigation Recommendations

European organizations should immediately deploy the September 2025 Microsoft security updates that introduce SMB Server audit capabilities to assess their environments for relay attack vulnerabilities and compatibility issues. Following assessment, organizations must enable SMB Server signing to cryptographically protect SMB communications and prevent tampering or relay. Additionally, enabling SMB Server Extended Protection for Authentication (EPA) is critical to bind authentication to the transport layer, mitigating relay attack vectors. Organizations should review and update Group Policy settings to enforce SMB signing and EPA across all Windows 10 1809 endpoints and servers. Network segmentation and monitoring for unusual SMB traffic patterns can help detect attempted relay attacks. Where possible, upgrading from Windows 10 Version 1809 to a supported, more secure Windows version should be prioritized to reduce exposure. Security teams should also educate users about the risks of interacting with untrusted SMB shares and implement strict access controls. Regular vulnerability scanning and penetration testing focusing on SMB configurations will help maintain a hardened posture. Finally, organizations should prepare incident response plans specific to SMB relay attack scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-08-11T20:26:16.631Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e4ce6ed8307545babf

Added to database: 9/9/2025, 6:28:52 PM

Last enriched: 11/27/2025, 4:34:05 AM

Last updated: 12/14/2025, 1:41:19 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats