CVE-2025-54093
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-10-02
Assigner: Microsoft Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_10_1507 | to 10.0.10240.21128 (exc) |
| microsoft | windows_10_1507 | to 10.0.10240.21128 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8422 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8422 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7792 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7792 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6332 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6332 (exc) |
| microsoft | windows_11_22h2 | to 10.0.22621.5909 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.5909 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.6508 (exc) |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | r2 |
| microsoft | windows_server_2012 | * |
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2016 | to 10.0.14393.8422 (exc) |
| microsoft | windows_server_2019 | to 10.0.17763.7792 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.4106 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.1849 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.6508 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-367 | The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a time-of-check to time-of-use (TOCTOU) race condition in the Windows TCP/IP stack. It allows an authorized attacker to exploit a timing issue between checking a condition and using the result, potentially leading to privilege escalation on the local system.
How can this vulnerability impact me? :
An attacker who is already authorized on the system could exploit this vulnerability to elevate their privileges, gaining higher-level access and control over the affected Windows system, which could lead to unauthorized actions and compromise of system integrity.