Home
Description
Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network.
PUBLISHED Reserved 2025-07-16 | Published 2025-09-09 | Updated 2025-10-17 | Assigner microsoft
MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Problem types
CWE-416: Use After Free
Product status
10.0.17763.0 (custom) before 10.0.17763.7792
affected
10.0.17763.0 (custom) before 10.0.17763.7792
affected
10.0.17763.0 (custom) before 10.0.17763.7792
affected
10.0.20348.0 (custom) before 10.0.20348.4171
affected
10.0.19044.0 (custom) before 10.0.19044.6332
affected
10.0.22621.0 (custom) before 10.0.22621.5909
affected
10.0.19045.0 (custom) before 10.0.19045.6332
affected
10.0.22631.0 (custom) before 10.0.22631.5909
affected
10.0.22631.0 (custom) before 10.0.22631.5909
affected
10.0.25398.0 (custom) before 10.0.25398.1849
affected
10.0.10240.0 (custom) before 10.0.10240.21128
affected
10.0.14393.0 (custom) before 10.0.14393.8422
affected
10.0.14393.0 (custom) before 10.0.14393.8422
affected
10.0.14393.0 (custom) before 10.0.14393.8422
affected
6.2.9200.0 (custom) before 6.2.9200.25675
affected
6.2.9200.0 (custom) before 6.2.9200.25675
affected
6.3.9600.0 (custom) before 6.3.9600.22774
affected
6.3.9600.0 (custom) before 6.3.9600.22774
affected
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54101 (Windows SMB Client Remote Code Execution Vulnerability) vendor-advisory
cve.org
(CVE-2025-54101)
nvd.nist.gov
(CVE-2025-54101)
Download JSON