Home

Description

Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network.

PUBLISHED Reserved 2025-07-16 | Published 2025-09-09 | Updated 2025-10-17 | Assigner microsoft




MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Problem types

CWE-416: Use After Free

Product status

10.0.17763.0 (custom) before 10.0.17763.7792
affected

10.0.17763.0 (custom) before 10.0.17763.7792
affected

10.0.17763.0 (custom) before 10.0.17763.7792
affected

10.0.20348.0 (custom) before 10.0.20348.4171
affected

10.0.19044.0 (custom) before 10.0.19044.6332
affected

10.0.22621.0 (custom) before 10.0.22621.5909
affected

10.0.19045.0 (custom) before 10.0.19045.6332
affected

10.0.22631.0 (custom) before 10.0.22631.5909
affected

10.0.22631.0 (custom) before 10.0.22631.5909
affected

10.0.25398.0 (custom) before 10.0.25398.1849
affected

10.0.10240.0 (custom) before 10.0.10240.21128
affected

10.0.14393.0 (custom) before 10.0.14393.8422
affected

10.0.14393.0 (custom) before 10.0.14393.8422
affected

10.0.14393.0 (custom) before 10.0.14393.8422
affected

6.2.9200.0 (custom) before 6.2.9200.25675
affected

6.2.9200.0 (custom) before 6.2.9200.25675
affected

6.3.9600.0 (custom) before 6.3.9600.22774
affected

6.3.9600.0 (custom) before 6.3.9600.22774
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54101 (Windows SMB Client Remote Code Execution Vulnerability) vendor-advisory

cve.org (CVE-2025-54101)

nvd.nist.gov (CVE-2025-54101)

Download JSON