Microsoft Windows Defender Firewall Flaws Allow Attackers Privilege Escalation

Microsoft’s September 2025 security update addresses four elevation-of-privilege flaws in the Windows Defender Firewall service, each rated Important in severity.

Detailed in the September 9 release, these vulnerabilities—CVE-2025-53808, CVE-2025-54104, CVE-2025-54109, and CVE-2025-54915—could allow an authenticated attacker with high privileges to elevate to Local Service-level access, posing a serious risk to system integrity.

Nature of the Firewall Vulnerabilities

Three of the flaws (CVE-2025-54104, CVE-2025-54109, CVE-2025-54915) stem from a type confusion error within the Firewall Service.

Type confusion arises when code treats a resource as one data type while it actually holds another, leading to memory corruption and unexpected behavior. In this case, a user in a restricted group can trigger the flaw to gain elevated rights.

The fourth issue, CVE-2025-53808, is also an elevation-of-privilege defect, though Microsoft’s advisory does not specify type confusion as its root cause.

All four vulnerabilities share the potential outcome of advancing a low-privileged account to Local Service privileges.

Exploitation Scenario and Requirements

Exploitation demands an authenticated user and membership in a specific restricted Windows user group, aligning with the CVSS metric Privileges Required: High (PR:H).

The attacker’s account must already possess Medium Integrity Level; successful exploitation increases that to Local Service.

While Local Service access falls short of full administrative control, it grants sufficient rights to manipulate system resources, install malicious software, or facilitate lateral movement within an environment.

CVE IdentifierVulnerability TypePrivileges RequiredCVSS 3.1 Score
CVE-2025-53808Service EoPHigh (PR:H)7.8
CVE-2025-54104Type ConfusionHigh (PR:H)7.8
CVE-2025-54109Type ConfusionHigh (PR:H)7.8
CVE-2025-54915Type ConfusionHigh (PR:H)7.5

Microsoft’s exploitability analysis rates three of the vulnerabilities—CVE-2025-53808, CVE-2025-54104, and CVE-2025-54109—as Less Likely to be exploited, with CVE-2025-54915 assessed as Exploitation Unlikely due to its high prerequisites.

Despite this, the Important severity underscores potential threats if an attacker meets conditions. No public disclosures or active exploits have been reported.

Microsoft has issued patches for all supported Windows versions.

Administrators and users are urged to deploy the September 2025 updates immediately to remediate these elevation-of-privilege vulnerabilities and safeguard against privilege escalation attacks.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here