SB2025090960 - Multiple vulnerabilities in Microsoft Windows Hyper-V
Published: September 9, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2025-54098)
The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in Windows Hyper-V. A local user can bypass implemented security restrictions and gain elevated privileges on the system.
2) Race condition (CVE-ID: CVE-2025-54115)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows Hyper-V. A local user can exploit the race and escalate privileges on the system.
3) Race condition (CVE-ID: CVE-2025-55224)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in Windows Hyper-V. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
4) Integer overflow (CVE-ID: CVE-2025-54091)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in Windows Hyper-V. A local user can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system with elevated privileges.
5) Race condition (CVE-ID: CVE-2025-54092)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows Hyper-V. A local user can exploit the race and escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54098
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54115
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55224
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54091
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54092