Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows BitLocker Vulnerability Let Attackers Elevate Privileges

Posted on September 10, 2025September 10, 2025 By CWS

Microsoft has addressed two vital elevation of privilege vulnerabilities affecting its Home windows BitLocker encryption function.

The failings, tracked as CVE-2025-54911 and CVE-2025-54912, had been disclosed on September 9, 2025, and carry an “Necessary” severity score.

Each vulnerabilities might enable a certified attacker to realize full SYSTEM privileges on a compromised machine, bypassing the safety layers that BitLocker is designed to implement.

Microsoft has famous that exploitation is taken into account “much less possible,” and as of the disclosure, the vulnerabilities haven’t been publicly detailed or seen exploited within the wild.

BitLocker Escalation of Privilege Vulnerability

Each CVE-2025-54911 and CVE-2025-54912 are categorised as “Use-After-Free” vulnerabilities, a standard and harmful kind of reminiscence corruption bug.

This weak spot, cataloged below CWE-416, happens when a program continues to make use of a pointer to a reminiscence location after that reminiscence has been freed or deallocated.

When an attacker can affect the information written to this deallocated house, they’ll typically manipulate this system’s execution circulation.

On this state of affairs, a malicious actor might leverage this management to execute arbitrary code, main to an entire system takeover.

The presence of two distinct “Use-After-Free” bugs in a important safety part like BitLocker highlights the continued challenges in sustaining reminiscence security in complicated software program.

Profitable exploitation of both vulnerability leads to a full privilege escalation. An attacker who leverages these flaws might acquire SYSTEM-level entry, the best stage of privilege on a Home windows system.

This is able to grant them the power to put in applications, view, change, or delete information, and create new accounts with full consumer rights.

In line with the CVSS metrics offered by Microsoft, an assault requires an adversary to have low-level privileges on the goal system already.

Moreover, some type of consumer interplay is critical for the exploit to succeed, that means an attacker would want to trick a certified consumer into performing a particular motion.

This prerequisite makes distant, automated assaults harder however doesn’t diminish the danger in eventualities the place an attacker has already gained an preliminary foothold.

Mitigations

In response to the invention, Microsoft has fastened the vulnerabilities within the September 2025 Patch Tuesday replace. The corporate has urged customers and directors to use the newest updates promptly to guard their techniques from potential assaults.

Whereas the exploitability is presently assessed as much less possible, the severity of the potential affect necessitates speedy motion.

The invention of CVE-2025-54912 was credited to Hussein Alrubaye, working with Microsoft, indicating a collaborative effort between the corporate and exterior safety researchers to establish and resolve important safety points.

Customers are suggested to verify for updates by way of the usual Home windows Replace service to make sure their techniques are not vulnerable to those privilege escalation flaws.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attackers, BitLocker, Elevate, Privileges, Vulnerability, Windows

Post navigation

Previous Post: Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System
Next Post: ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories

Related Posts

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data Cyber Security News
Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems Cyber Security News
Cybercrime-as-a-Service – Countering Accessible Hacking Tools Cyber Security News
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks
  • Top 10 Best Mobile Application Penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks
  • Top 10 Best Mobile Application Penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News