9.8
CVE-2025-55234
- EPSS 0.54%
- Published 09.09.2025 17:01:32
- Last modified 12.09.2025 14:44:14
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA. Adopt appropriate SMB Server hardening measures.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.21128
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.21128
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.8422
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.8422
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.7792
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.7792
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.6332
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.6332
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.5909
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.5909
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.6508
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx86
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.8422
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.7792
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.4106
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1849
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.6508
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.54% | 0.667 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
secure@microsoft.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.