Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55236: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-55236cvecve-2025-55236cwe-367cwe-843
Published: Tue Sep 09 2025 (09/09/2025, 17:01:05 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Time-of-check time-of-use (toctou) race condition in Graphics Kernel allows an authorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:34:23 UTC

Technical Analysis

CVE-2025-55236 is a vulnerability classified as a time-of-check to time-of-use (TOCTOU) race condition (CWE-367) found in the Graphics Kernel component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises when the system performs a security check on a resource or condition but uses that resource later without revalidating it, allowing an attacker to manipulate the state between check and use. In this case, an authorized local attacker can exploit the race condition to execute arbitrary code with elevated privileges. The flaw affects the Graphics Kernel, a critical component responsible for rendering and graphics operations, which runs with high privileges. Exploitation requires local access with some privileges (PR:L) and user interaction (UI:R), but no advanced exploit techniques are necessary (AC:L). The vulnerability impacts confidentiality, integrity, and availability (all rated high), enabling potential full system compromise. The CVSS 3.1 score of 7.3 reflects a high severity level. No public exploits or patches are currently available, indicating a window of exposure. The vulnerability was reserved on August 11, 2025, and published on September 9, 2025. Given the affected version is Windows 10 Version 1809, which is an older but still in-use release, many enterprise environments may remain vulnerable. The race condition nature of the flaw means timing and precise conditions are required for successful exploitation, but the consequences are severe if exploited.

Potential Impact

The impact of CVE-2025-55236 is significant for organizations running Windows 10 Version 1809. Successful exploitation allows an authorized local attacker to execute arbitrary code with elevated privileges within the Graphics Kernel context, potentially leading to full system compromise. This includes unauthorized access to sensitive data (confidentiality), modification or destruction of data or system components (integrity), and disruption or denial of service (availability). The vulnerability could be leveraged to bypass security controls, install persistent malware, or move laterally within networks. Since the Graphics Kernel operates at a high privilege level, exploitation could undermine endpoint security solutions and system stability. Organizations with many users on this Windows version, especially in sectors with high-value targets such as government, finance, healthcare, and critical infrastructure, face increased risk. The lack of known public exploits reduces immediate risk but also means attackers may be developing exploits. The absence of patches at publication time necessitates urgent mitigation to reduce exposure.

Mitigation Recommendations

Until an official patch is released, organizations should implement targeted mitigations to reduce risk from CVE-2025-55236. These include: 1) Restrict local user privileges to the minimum necessary, avoiding granting administrative or elevated rights to standard users; 2) Enforce strict user access controls and monitor for unusual local user activity, especially related to graphics subsystem processes; 3) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious code execution attempts; 4) Educate users to avoid executing untrusted code or performing risky actions that require user interaction; 5) Isolate critical systems running Windows 10 Version 1809 from untrusted networks and users; 6) Prepare for rapid deployment of patches once Microsoft releases updates by maintaining robust update management processes; 7) Consider upgrading affected systems to a supported, patched Windows version if feasible; 8) Monitor threat intelligence sources for emerging exploit information related to this vulnerability. These steps go beyond generic advice by focusing on privilege restriction, user behavior, and proactive monitoring specific to the vulnerability context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-08-11T20:26:16.632Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e4ce6ed8307545bac2

Added to database: 9/9/2025, 6:28:52 PM

Last enriched: 2/21/2026, 9:34:23 PM

Last updated: 3/25/2026, 9:27:38 PM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses