Loading HuntDB...

CVE-2025-55234

HIGH
Published 2025-09-09T17:01:32.635Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-55234. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
8.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
Not Available
Attack Complexity
Not Available
Privileges Required
Not Available
User Interaction
Not Available
Scope
Not Available

Impact Metrics

Confidentiality
Not Available
Integrity
Not Available
Availability
Not Available

Description

No description available

Available Exploits

No exploits available for this CVE.

Related News

Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234)

8Critical72Important0Moderate0LowMicrosoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed.Microsoft addresses 80 CVEs in its September 2025 Patch Tuesday release, with eight rat…

Tenable.com 2025-09-09 17:38

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Malicious code in bioql (PyPI)

Affected Products (ENISA)

microsoft
windows 11 version 22h2

ENISA Scoring

CVSS Score (3.1)

8.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

EPSS Score

0.540
probability

Data provided by ENISA EU Vulnerability Database. Last updated: October 3, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-9x8h-hfmc-8j5r

Advisory Details

SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA. Adopt appropriate SMB Server hardening measures.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: September 9, 2025, Modified: September 12, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

8 posts
Reddit 1 month, 3 weeks ago
MotasemHa
Exploit PoC

Critical Microsoft SMB Vulnerability | CVE-2025-55234 Explained Deep dive into the critical Microsoft SMB CVE-2025-55234 , what Windows systems it affects, the technical root cause behind SMB/NTLM relay exposure, a lab-safe PoC overview, and a step-by-step mitigation playbook (patches, GPOs, PowerShell, and detection). This vulnerability is a great reminder that …

1
1.0
View Original High Risk
Reddit 1 month, 3 weeks ago
splashtop_inc
Exploit

September 2025 Patch Tuesday: 81 Vulnerabilities, 2 Zero-Days Microsoft’s September 2025 Patch Tuesday delivers fixes for 81 vulnerabilities across Windows, Office, SQL Server, and other products. The update addresses two publicly disclosed zero-day flaws: one in Windows SMB (CVE-2025-55234) that could enable relay attacks, and another in Newtonsoft.Json (CVE-2024-21907) used …

Also mentions: CVE-2024-21907
2
2.0
View Original High Risk
Reddit 1 month, 3 weeks ago
MauriceTorres
Exploit PoC

Discover the latest updates from Action1 **Live Demo: Patching That Just Works with Action1** 💡 Patch management doesn’t have to be complex. Learn how to simplify and automate in our upcoming live demo on Wednesday, September 17: 𝗣𝗮𝘁𝗰𝗵𝗶𝗻𝗴 𝗧𝗵𝗮𝘁 𝗝𝘂𝘀𝘁 𝗪𝗼𝗿𝗸𝘀 𝘄𝗶𝘁𝗵 𝗔𝗰𝘁𝗶𝗼𝗻𝟭. Register here> [http://on.action1.com/467almd](http://on.action1.com/467almd) \---------------------------------------------------------------------------------------------------------------------- **Patch Tuesday Spetember …

Also mentions: CVE-2025-21907
2
2.0
View Original High Risk
Reddit 1 month, 4 weeks ago
crstux
Exploit Payload

🔥 Top 10 Trending CVEs (11/09/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-55234](https://nvd.nist.gov/vuln/detail/CVE-2025-55234)** - 📝 Windows SMB Elevation of Privilege Vulnerability - 📅 **Published:** 09/09/2025 - 📈 **CVSS:** 8.8 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 11 - ⚠️ **Priority:** 2 - 📝 …

1
1.0
View Original High Risk
Reddit 2 months ago
Suspicious_Bug4112

Microsoft Addresses 80 Security Flaws, Eight Critical, CVSS 10.0 **Date:** 10-Sep-25 Microsoft has addressed 80 security vulnerabilities in its software, with eight rated as critical. Notably, CVE-2025-55234, a privilege escalation flaw in Windows SMB, has been marked as publicly known, while Azure Networking vulnerability CVE-2025-54914 received a rare CVSS score …

Also mentions: CVE-2025-54914
Reddit 2 months ago
RoboShadow_Liz
Exploit PoC

Patch Tuesday: September 2025 Summary The year is flying past! Microsoft released September's Patch Tuesday update yesterday, releasing updates for 81 vulnerabilities, which includes 2 publicly disclosed zero days. Pssst, as a reminder... did you know that you can now set up AutoFix rules for [Windows Updates](https://portal.roboshadow.com/reports/os-updates) with RoboShadow's Cyber …

6
6.0
View Original High Risk
Reddit 2 months ago
FIDclav
Exploit

2025 September KB5065429 Windows 10 Patch | 2 Zero Day Vulnerabilities and 81 Flaws The September 2025 Windows 10 Patch (KB5065429) delivers a significant security update, addressing 81 vulnerabilities including two zero-day threats—one in Newtonsoft.Json and another in Windows SMB. These fixes enhance system protection against potential exploits, with the …

Also mentions: CVE-2024-21907
5
5.0
View Original High Risk
Reddit 2 months ago
FIDclav
Exploit

2025 September KB5065426 KB5065431 Windows 11 Patch | 2 Zero Day Vulnerabilities and 81 Flaws The September 2025 Windows 11 patch delivers a robust set of updates aimed at enhancing both security and user experience. It addresses two critical zero-day vulnerabilities—one involving Windows SMB and another tied to the Newtonsoft.Json …

Also mentions: CVE-2024-21907
4
4.0
View Original High Risk

References

Published: 2025-09-09T17:01:32.635Z
Last Modified: 2025-09-18T21:42:46.784Z
Copied to clipboard!