MSRC compact vulnerability detail

CVE-2025-54101 · Windows SMB Client Remote Code Execution Vulnerability

Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network.

Severity
Important
Impact
Remote Code Execution
CVSS
4.8 base · 4.2 temporal
Release
2025-09-09
Signals
Windows SMBv3 Client Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network.
FAQ / Articles
FAQ
According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability? Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.
Windows SMBv3 Client/Server Remote Code Execution Vulnerability
Use after free in Windows SMBv3 Client/Server allows an authorized attacker to execute code over a network.
Windows SMBv3 Client Remote Code Execution Vulnerability
Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network.
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition.