Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges

Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges

Posted on September 12, 2025September 12, 2025 By CWS

Microsoft has addressed 4 elevation of privilege vulnerabilities in its Home windows Defender Firewall service, all rated as “Vital” in severity.

The safety flaws have been detailed in Microsoft’s September 9, 2025, safety replace launch. If exploited, these vulnerabilities might enable an authenticated attacker to realize larger privileges on an affected system.

The 4 vulnerabilities are tracked as CVE-2025-53808, CVE-2025-54104, CVE-2025-54109, and CVE-2025-54915. All 4 allow a neighborhood attacker to escalate their privileges, posing a major threat to system integrity.

On the time of disclosure, Microsoft said that not one of the vulnerabilities had been publicly disclosed or actively exploited within the wild.

Nature Of The Firewall Vulnerabilities

Three of the 4 vulnerabilities (CVE-2025-54104, CVE-2025-54109, and CVE-2025-54915) are brought on by a “kind confusion” flaw inside the Home windows Defender Firewall Service.

Sort confusion is a standard class of reminiscence security bug the place a program makes an attempt to entry a useful resource with an incompatible kind, resulting in surprising and sometimes insecure conduct.

On this case, it permits a licensed attacker to set off a situation that results in native privilege escalation.

The fourth vulnerability, CVE-2025-53808, can also be a service elevation of privilege flaw, although Microsoft’s advisory doesn’t specify it as a kind confusion bug.

The widespread thread amongst all 4 is the potential final result: a low-privileged person gaining elevated system rights.

Understanding The Assault Situation

To use any of those vulnerabilities, an attacker should first have authenticated entry to the goal machine. Moreover, exploitation requires the attacker’s account to be a member of a selected, restricted person group.

This excessive prerequisite is mirrored within the CVSS metric “Privileges Required: Excessive (PR:H),” indicating {that a} informal or unauthenticated attacker can not leverage these flaws.

A profitable exploit would enable the attacker to raise their privileges from a “Medium Integrity Stage” to “Native Service.”

Whereas not full system or administrator-level management, gaining Native Service privileges offers vital capabilities, permitting an attacker to entry and manipulate a variety of system assets, set up malicious software program, or additional compromise the affected host.

Microsoft’s Evaluation And Mitigation

Microsoft’s exploitability evaluation signifies that an assault is “Much less Seemingly” for CVE-2025-53808, CVE-2025-54104, and CVE-2025-54109.

For CVE-2025-54915, the evaluation is even decrease, at “Exploitation Unlikely.” This evaluation is predicated on the excessive privileges required for an attacker to be ready to use the issues.

Regardless of the low chance of exploitation, the “Vital” severity score underscores the potential hazard if an attacker meets the mandatory conditions.

Microsoft has launched safety updates to patch these vulnerabilities throughout all affected variations of Home windows.

System directors and customers are strongly suggested to use the September 2025 safety updates promptly to guard their techniques and mitigate the danger of potential privilege escalation assaults.

Cyber Security News Tags:Attackers, Defender, Escalate, Firewall, Microsoft, Privileges, Vulnerabilities, Windows

Post navigation

Previous Post: Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm
Next Post: New Malware Using Azure Functions For Hosting Command And Control Infrastructure

Related Posts

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique Cyber Security News
Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack Cyber Security News
Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor Cyber Security News
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign Cyber Security News
DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware Cyber Security News
Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark