CVE-2025-54918

8.8 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to exploit improper authentication in Windows NTLM to elevate privileges over a network. It affects Windows systems using NTLM authentication, potentially enabling attackers to gain higher privileges than intended.

💻 Affected Systems

Products:
  • Windows NTLM authentication component
Versions: Specific versions to be confirmed via Microsoft advisory
Operating Systems: Windows Server, Windows Client versions
Default Config Vulnerable: ⚠️ Yes
Notes: Systems using NTLM authentication are vulnerable; Kerberos-only environments may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains domain administrator privileges, leading to complete network compromise, data exfiltration, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attackers with initial access escalate privileges to access sensitive systems, move laterally across the network, and compromise additional accounts.

🟢

If Mitigated

With proper network segmentation, privileged access management, and monitoring, impact is limited to isolated segments with minimal data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and network connectivity to target; exploitation details not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: To be specified in Microsoft Security Update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54918

Restart Required: Yes

Instructions:

1. Check Microsoft Security Update for patch details. 2. Apply Windows Update via Settings > Update & Security > Windows Update. 3. For enterprise: Deploy via WSUS, SCCM, or Intune. 4. Restart systems as required.

🔧 Temporary Workarounds

Disable NTLM authentication

windows

Configure systems to use Kerberos only where possible

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "RestrictNTLM" -Value 1

Implement network segmentation

all

Restrict NTLM traffic between network segments

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems using NTLM
  • Enforce multi-factor authentication and privileged access management

🔍 How to Verify

Check if Vulnerable:

Check Windows version and NTLM configuration; monitor for Microsoft's specific detection guidance

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows the relevant security patch installed

📡 Detection & Monitoring

Log Indicators:

  • Unusual NTLM authentication events
  • Failed authentication followed by successful privileged access
  • Event ID 4624 with NTLM logon type

Network Indicators:

  • Anomalous NTLM traffic patterns
  • Unexpected NTLM authentication from unusual sources

SIEM Query:

source="windows_security" event_id=4624 authentication_package="NTLM" | stats count by user, src_ip

🔗 References

📤 Share & Export