Detailed in the September 9 release, these vulnerabilities—CVE-2025-53808, CVE-2025-54104, CVE-2025-54109, and CVE-2025-54915—could allow an authenticated attacker with high privileges to elevate to Local Service-level access, posing a serious risk to system integrity.
Three of the flaws (CVE-2025-54104, CVE-2025-54109, CVE-2025-54915) stem from a type confusion error within the Firewall Service.
Type confusion arises when code treats a resource as one data type while it actually holds another, leading to memory corruption and unexpected behavior. In this case, a user in a restricted group can trigger the flaw to gain elevated rights.
The fourth issue, CVE-2025-53808, is also an elevation-of-privilege defect, though Microsoft’s advisory does not specify type confusion as its root cause.
All four vulnerabilities share the potential outcome of advancing a low-privileged account to Local Service privileges.
Exploitation demands an authenticated user and membership in a specific restricted Windows user group, aligning with the CVSS metric Privileges Required: High (PR:H).
The attacker’s account must already possess Medium Integrity Level; successful exploitation increases that to Local Service.
While Local Service access falls short of full administrative control, it grants sufficient rights to manipulate system resources, install malicious software, or facilitate lateral movement within an environment.
| CVE Identifier | Vulnerability Type | Privileges Required | CVSS 3.1 Score |
|---|---|---|---|
| CVE-2025-53808 | Service EoP | High (PR:H) | 7.8 |
| CVE-2025-54104 | Type Confusion | High (PR:H) | 7.8 |
| CVE-2025-54109 | Type Confusion | High (PR:H) | 7.8 |
| CVE-2025-54915 | Type Confusion | High (PR:H) | 7.5 |
Microsoft’s exploitability analysis rates three of the vulnerabilities—CVE-2025-53808, CVE-2025-54104, and CVE-2025-54109—as Less Likely to be exploited, with CVE-2025-54915 assessed as Exploitation Unlikely due to its high prerequisites.
Despite this, the Important severity underscores potential threats if an attacker meets conditions. No public disclosures or active exploits have been reported.
Microsoft has issued patches for all supported Windows versions.
Administrators and users are urged to deploy the September 2025 updates immediately to remediate these elevation-of-privilege vulnerabilities and safeguard against privilege escalation attacks.
Find this Story Interesting! Follow us on Google News, LinkedIn and X to Get More Instant Updates
The post Microsoft Windows Defender Firewall Flaws Allow Attackers Privilege Escalation appeared first on Cyber Security News.
In September, Donald Trump claimed that "the United States is getting a tremendous fee" for…
ABILENE, Texas (KTAB/KRBC) - Two men in Abilene, a father and son, were arrested Friday…
According to Reuters, Meta is looking to offset spending on AI and data centers with…
Hulu has decided to scrap Buffy the Vampire Slayer: New Sunnydale, its planned continuation series…
Jostling a folded piece of paper, holding it marooned in the air, selectman Beth Blair…
Boscawen voters cruised through a speedy town meeting Friday night, one with so little controversy…
This website uses cookies.