9.8

CVE-2025-55234

Media report

SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks.
The SMB Server already supports mechanisms for hardening against relay attacks:

SMB Server signing
SMB Server Extended Protection for Authentication (EPA)

Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks.
If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks:

Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates.  See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA.
Adopt appropriate SMB Server hardening measures.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 10 1507 HwPlatformx64 Version < 10.0.10240.21128
MicrosoftWindows 10 1507 HwPlatformx86 Version < 10.0.10240.21128
MicrosoftWindows 10 1607 HwPlatformx64 Version < 10.0.14393.8422
MicrosoftWindows 10 1607 HwPlatformx86 Version < 10.0.14393.8422
MicrosoftWindows 10 1809 HwPlatformx64 Version < 10.0.17763.7792
MicrosoftWindows 10 1809 HwPlatformx86 Version < 10.0.17763.7792
MicrosoftWindows 10 21h2 Version < 10.0.19044.6332
MicrosoftWindows 10 22h2 Version < 10.0.19045.6332
MicrosoftWindows 11 22h2 Version < 10.0.22621.5909
MicrosoftWindows 11 23h2 Version < 10.0.22631.5909
MicrosoftWindows 11 24h2 Version < 10.0.26100.6508
MicrosoftWindows Server 2008 Version- Updatesp2 HwPlatformx64
MicrosoftWindows Server 2008 Version- Updatesp2 HwPlatformx86
MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
MicrosoftWindows Server 2016 Version < 10.0.14393.8422
MicrosoftWindows Server 2019 Version < 10.0.17763.7792
MicrosoftWindows Server 2022 Version < 10.0.20348.4106
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.1849
MicrosoftWindows Server 2025 Version < 10.0.26100.6508
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.54% 0.667
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
secure@microsoft.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.