Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55234: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-55234cvecve-2025-55234cwe-287
Published: Tue Sep 09 2025 (09/09/2025, 17:01:32 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA. Adopt appropriate SMB Server hardening measures.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 23:57:13 UTC

Technical Analysis

CVE-2025-55234 addresses an improper authentication vulnerability (CWE-287) in the SMB Server of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability allows attackers to conduct relay attacks against SMB authentication processes if the server is not properly hardened. Relay attacks exploit the authentication handshake by intercepting and relaying credentials to gain unauthorized access or elevate privileges. Windows SMB Server supports hardening mechanisms such as SMB Server signing, which cryptographically signs SMB packets to prevent tampering, and SMB Server Extended Protection for Authentication (EPA), which binds authentication to the transport layer to prevent credential relay. However, if these protections are not enabled, the server remains vulnerable. Microsoft’s September 2025 security update introduces audit capabilities that allow administrators to monitor and assess SMB Server configurations for potential relay attack exposure and compatibility issues before enforcing hardening. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with attack vector being network (remote), low attack complexity, no privileges required, but requiring user interaction. The impact includes potential full compromise of confidentiality, integrity, and availability through elevation of privilege attacks. No public exploits are known at this time, but the risk remains significant for unpatched or improperly configured systems.

Potential Impact

The vulnerability poses a significant risk to organizations running Windows 10 Version 1507 with SMB Server configurations lacking proper hardening. Successful exploitation can lead to relay attacks that allow attackers to impersonate legitimate users, escalate privileges, and gain unauthorized access to sensitive resources. This can result in data breaches, unauthorized data modification, and disruption of services. Given the widespread use of SMB in enterprise environments for file sharing and authentication, the vulnerability could facilitate lateral movement within networks, increasing the risk of broader compromise. The requirement for user interaction slightly limits exploitation scenarios but does not eliminate risk, especially in environments where social engineering or phishing can induce user actions. Organizations relying on legacy Windows 10 versions or those with incomplete SMB hardening are particularly vulnerable. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the critical need for remediation to prevent potential attacks.

Mitigation Recommendations

Organizations should immediately assess their SMB Server configurations using the audit capabilities introduced in the September 2025 security updates to identify vulnerable systems and compatibility issues. It is critical to enable SMB Server signing to cryptographically protect SMB communications against tampering and replay. Additionally, enabling SMB Server Extended Protection for Authentication (EPA) binds authentication to the transport layer, preventing credential relay attacks. Where possible, upgrade systems to newer Windows versions with improved security features and support. Network segmentation and limiting SMB traffic to trusted segments can reduce exposure. Employ strict access controls and monitor SMB-related logs for unusual authentication attempts or relay attack indicators. Educate users to recognize and avoid social engineering attempts that could trigger user interaction required for exploitation. Regularly review and apply Microsoft security updates and advisories related to SMB and authentication hardening. Avoid running legacy SMB versions or configurations that do not support these protections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-08-11T20:26:16.631Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e4ce6ed8307545babf

Added to database: 9/9/2025, 6:28:52 PM

Last enriched: 2/28/2026, 11:57:13 PM

Last updated: 3/24/2026, 5:42:05 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses