CVE-2025-55234

Published Sep 9, 2025

Last updated 12 days ago

CVSS high 8.8
SMB Server

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-55234 is an elevation of privilege vulnerability affecting Windows Server Message Block (SMB). It exists because SMB sessions can be established without properly validating the authentication context when key hardening measures, such as SMB signing and extended protection for authentication (EPA), are not in place. An unauthenticated, remote attacker could perform relay attacks by exploiting improper authentication mechanisms in SMB Server configurations over a network connection. Successful exploitation could allow an attacker to elevate their privileges to that of the compromised user's account. Microsoft has released audit capabilities to help customers assess their environment and identify potential incompatibility issues before deploying SMB Server hardening measures.

Description
SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA. Adopt appropriate SMB Server hardening measures.
Source
secure@microsoft.com
NVD status
Analyzed
Products
windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

secure@microsoft.com
CWE-287
nvd@nist.gov
NVD-CWE-noinfo

Social media

Hype score
Not currently trending
  1. Hey devs, September's Patch Tuesday dropped some nasty Windows bugs: NTFS buffer overflow (CVE-2025-54916) and SMB replay attacks (CVE-2025-55234) that could lead to code exec. Patch now, or risk the hackers' party. Also, Pixie Dust still haunting IoT after a decade?

    @Weezy_Dev

    20 Sept 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/P2w2ILulSM https://t.co/MwlwaMEPkj

    @dansantanna

    17 Sept 2025

    39 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/TpAzfP1q3l https://t.co/M5T9mCLGje

    @pcasano

    15 Sept 2025

    24 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Microsoft'un Eylül Yaması: 80 Güvenlik Açığı Düzeltildi, Bazıları Kritik** Microsoft, Eylül 2025 Patch Tuesday'sinde tam 80 güvenlik açığını yamaladı. Bunlar arasında SMB'de ayrıcalık yükseltme (CVE-2025-55234) ve Azure Networking'de CVSS 10.0 skoru taşıya

    @KiraliikHacker

    14 Sept 2025

    66 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Mobile & Laptop Security: Samsung patched CVE-2025-21043, zero-day in Android; update to block exploits. Microsoft fixed 86 Windows flaws, incl. CVE-2025-55234; update. Google patched 111 Android vulns, 2 critical; update ASAP. Apple alerts users to spyware; use Lockdown Mode

    @viridianlock

    12 Sept 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. September #PatchTuesday: 176 fixes, five critical RCEs, and multiple zero-days. Key priorities include SQL Server (CVE-2024-21907), Azure HPC (CVE-2025-55232), and SMB server (CVE-2025-55234). Full analysis 👉 https://t.co/gy4h6Rk61u https://t.co/iPrkDU1JZb

    @rapid7

    12 Sept 2025

    1365 Impressions

    0 Retweets

    2 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  7. ⚠️Actualizaciones de seguridad mensuales de Microsoft ❗CVE-2025-55232 ❗CVE-2025-55227 ❗CVE-2025-55234 ➡️Más info: https://t.co/m71z9xeyXb https://t.co/439OhGO7DK

    @CERTpy

    12 Sept 2025

    140 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  8. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/GEECiCUkiA https://t.co/EtVp9bQRzN

    @ggrubamn

    12 Sept 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 𝐏𝐚𝐭𝐜𝐡 𝐓𝐮𝐞𝐬𝐝𝐚𝐲 𝗦𝗲𝗽𝘁𝗲𝗺𝗯𝗲𝗿 𝟐𝟎𝟐𝟓 𝐇𝐢𝐠𝐡𝐥𝐢𝐠𝐡𝐭𝐬 𝐘𝐨𝐮 𝐒𝐡𝐨𝐮𝐥𝐝𝐧’𝐭 𝐌𝐢𝐬𝐬 ▪️Microsoft has addressed 81 vulnerabilities, two zero-days with

    @Action1corp

    12 Sept 2025

    117 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Microsoft released its September Patch Tuesday, fixing 80 vulnerabilities in its products. Eight of them are critical. One of the privilege escalation vulnerabilities in Windows SMB (CVE-2025-55234) was publicly disclosed prior to the release of the patch. Update your systems htt

    @cheatmaste79573

    11 Sept 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/j7lgD61FrW https://t.co/64bOwIyTes

    @valterpcjr

    11 Sept 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 80 fixes. 8 Critical. 0 known exploited. Microsoft patches SMB priv-esc (CVE-2025-55234) and an Azure bug with CVSS 10.0, plus HPC Pack RCE 9.8 and NTLM EoP 8.8. Patch now and enable SMB signing and EPA. https://t.co/K0v8ovXSPK #CyberSecurity #PatchTuesday

    @Prevent_Cyber

    11 Sept 2025

    73 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  13. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/0ytwRiGvbA https://t.co/kyVhl19wEC

    @secured_cyber

    10 Sept 2025

    39 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/MCwaZ7UoPd https://t.co/MQI6lRZCU5

    @EAlexStark

    10 Sept 2025

    106 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Microsoft just dropped a massive Patch Tuesday: ⚡ 80 flaws fixed — 8 critical ⚡ One already public: SMB bug (CVE-2025-55234) that opens the door to relay + MITM attacks ⚡ A 10.0 Azure flaw + NTLM bug that could hand over SYSTEM access Patch now. Audit SMB. Details

    @TheHackersNews

    10 Sept 2025

    25521 Impressions

    46 Retweets

    158 Likes

    53 Bookmarks

    6 Replies

    5 Quotes

  16. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/KcsmVh0lvC https://t.co/3sjI7guX0P

    @Trej0Jass

    10 Sept 2025

    44 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Vulnerability Brief: CVE-2025-55234 — Windows SMB Elevation of Privilege Read the full analysis: https://t.co/kNI1oiwVwq https://t.co/XaAi9BzfS7

    @Iambivash007

    10 Sept 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. 今日はいろんなぱっちちゅうずでー ▼Microsoft 2025 年 9 月のセキュリティ更新プログラム (月例) https://t.co/3HGdf04I8w CVE-2025-55234 →Windows SMB の特権昇格の脆弱性 CVE-2024-21907 →Newtonsoft.Json での例外的な状態の不適

    @taku888infinity

    9 Sept 2025

    398 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234) https://t.co/6kHxAhKcpp https://t.co/uyop1T3peY

    @Art_Capella

    9 Sept 2025

    95 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. CVE-2025-55234 SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay atta… https://t.co/gOQ1lGzr2k

    @CVEnew

    9 Sept 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. 🔍 Microsoft’s new guidance on CVE-2025-55234 helps admins spot SMB relay vulnerabilities before they become a party crasher! Time to audit those settings and keep the privilege elevation at bay! #WindowsForum #CyberSecurity #SMB https://t.co/a5fOAL7b2K

    @windowsforum

    9 Sept 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Microsoft Patch Tuesday: 81 vulnerabilidades corregidas, incluidas dos zero-day en SMB Server (CVE-2025-55234) y Newtonsoft.Json (CVE-2024-21907), además de fallos críticos en NTLM, NTFS y Microsoft Office. ¡Actualiza de inmediato! https://t.co/T18lkShM8c

    @CompunetChile

    9 Sept 2025

    122 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 𝗧𝗼𝗱𝗮𝘆'𝘀 𝗣𝗮𝘁𝗰𝗵 𝗧𝘂𝗲𝘀𝗱𝗮𝘆 𝗼𝘃𝗲𝗿𝘃𝗶𝗲𝘄: ▪️ Microsoft has addressed 81 vulnerabilities, two zero-days with PoC (CVE-2025-55234 and CVE-2025-21907), 8 critical ▪️ Third-party: actively exploited vulnerabi

    @Action1corp

    9 Sept 2025

    401 Impressions

    2 Retweets

    2 Likes

    1 Bookmark

    0 Replies

    0 Quotes

Configurations

References

Sources include official advisories and independent security research.