Tuesday, September 16, 2025

Microsoft Home windows Defender Firewall Vulnerabilities Permit Privilege Escalation


Microsoft has launched safety advisories for 4 newly found vulnerabilities in its Home windows Defender Firewall Service that would allow attackers to raise privileges on affected Home windows methods.

The issues, tracked as CVE-2025-53808, CVE-2025-54104, CVE-2025-54109, and CVE-2025-54915, have been all disclosed on September 9, 2025, and share comparable traits.

Whereas exploitation requires native entry, profitable assaults might enable menace actors to execute code at SYSTEM degree, bypassing regular safety boundaries.

Particulars of the Vulnerabilities

Every vulnerability entails Kind Confusion (CWE-843), a weak spot the place the firewall service misinterprets the kind of a useful resource, resulting in unauthorized operations.

All 4 flaws are categorized as Necessary severity and carry a CVSS 3.1 base rating of 6.7 with a temporal rating of 5.8.

The assault vector is native (AV:L), with low complexity (AC:L), excessive privileges required (PR:H), and no person interplay wanted (UI:N).

CVE Identifier Affect Max Severity CVSS 3.1 Rating (Base/Temporal)
CVE-2025-53808 Elevation of Privilege Necessary 6.7 / 5.8
CVE-2025-54104 Elevation of Privilege Necessary 6.7 / 5.8
CVE-2025-54109 Elevation of Privilege Necessary 6.7 / 5.8
CVE-2025-54915 Elevation of Privilege Necessary 6.7 / 5.8

Confidentiality, integrity, and availability impacts are all excessive (C:H/I:H/A:H). Microsoft charges the exploit maturity as unproven (E:U) with official fixes already launched (RL:O) and confirmed stories (RC:C).

These vulnerabilities reside within the Home windows Defender Firewall Service executable operating with elevated privileges.

An attacker who can go surfing regionally to a goal machine might leverage certainly one of these flaws to execute arbitrary code as SYSTEM.

This might function a stepping stone for full compromise, particularly in environments the place native person accounts are poorly managed.

Mitigation and Suggestions

Microsoft has supplied patches for all affected Home windows variations by its September 2025 safety updates. System directors are urged to:

  • Deploy the September safety replace instantly to make sure the firewall service is patched.
  • Prohibit native account logins to trusted personnel solely.
  • Monitor system occasion logs for uncommon firewall service habits or crash occasions that would point out makes an attempt to use these flaws.
  • Implement least-privilege insurance policies to attenuate the affect if native account credentials are compromised.

Though these vulnerabilities require native entry, they pose a major danger in company environments the place staff have administrative privileges or the place laptops could also be bodily accessed by unauthorized people.

As soon as an attacker features SYSTEM privileges, they’ll disable safety controls, set up persistent malware, or transfer laterally inside a community.

Addressing these points promptly reduces the window of alternative for menace actors to use them.

Home windows Defender Firewall has lengthy been a core part of Microsoft’s defense-in-depth technique.

These elevation of privilege vulnerabilities spotlight the significance of standard patching and stringent entry controls.

By making use of the out there updates and imposing sturdy safety insurance policies, organizations can safeguard towards potential privilege escalation assaults concentrating on the firewall service.

Discover this Story Fascinating! Observe us on LinkedIn and X to Get Extra Instantaneous Updates.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com