CVE-2025-54918

Published Sep 9, 2025

Last updated 4 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-54918 is an improper authentication vulnerability found within the Windows NTLM (NT LAN Manager) protocol. This flaw allows an authorized attacker, who already possesses low-level privileges, to elevate their access over a network. The vulnerability can lead to unauthorized access to sensitive resources, potential execution of arbitrary code with higher privileges, manipulation of system configurations, or disruption of system availability. This vulnerability impacts various versions of Microsoft Windows, including Windows 10, Windows 11, and several Windows Server editions (2008, 2012, 2016, 2019, 2022, and 2025). Specifically, it can affect domain controllers running LDAP or LDAPS services, enabling an attacker to escalate privileges from a standard domain user to SYSTEM level access, potentially compromising entire Active Directory environments. Publicly available proof-of-concept exploits exist for this vulnerability.

Description
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.
Source
secure@microsoft.com
NVD status
Analyzed
Products
windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

secure@microsoft.com
CWE-287

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

14

  1. Lots of recent posts on NTLM reflection → AD compromise. To be clear: real fix is CVE-2025-54918, not CVE-2025-33073. Until Oct 2025, any user could own a 2025 domain if DCs ran Print Spooler. https://t.co/6098AHxhYM

    @decoder_it

    21 Jan 2026

    9363 Impressions

    45 Retweets

    162 Likes

    122 Bookmarks

    0 Replies

    0 Quotes

  2. Small update on "printerbugnew:" added a description of how to exploit CVE-2025-54918: DCs running 2025 allow reflection RPC->LDAPS - from a standard user to DA before patch😃 https://t.co/MWXfrkZBev

    @decoder_it

    28 Oct 2025

    8803 Impressions

    46 Retweets

    178 Likes

    87 Bookmarks

    0 Replies

    0 Quotes

  3. في سبتمبر 2025، أصدرت مايكروسوفت تحديثات أمنية ل80+ ثغرة في برامجها، والأنباء الجيدة أنها لم تُستغل بعد. من بين الثغرات المهمة CVE-2025-54918، المتعلق بنظام NTLM. تُن

    @Cybereayn

    18 Sept 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🔒 Patch Tuesday de septembre 2025 : Microsoft corrige 80+ vulnérabilités, aucune n’est exploitée activement. Cependant, certaines comme CVE-2025-54918 et CVE-2025-54912 méritent votre attention. Avez-vous mis à jour vos systèmes récemment ? #cybersécurité #cyberséc

    @CyberSentinelle

    18 Sept 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Among the vulnerabilities, CVE-2025-54918 (NTLM Elevation of Privilege) and CVE-2025-54916 (NTFS Remote Code Execution) stand out. Both are marked as 'Exploitation More Likely.' #RiskManagement

    @Cyb3r_5wift

    9 Sept 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations

References

Sources include official advisories and independent security research.