8.8

CVE-2025-33073

Warnung
Medienbericht
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrosoftWindows 10 1507 HwPlatformx64 Version < 10.0.10240.21034
MicrosoftWindows 10 1507 HwPlatformx86 Version < 10.0.10240.21034
MicrosoftWindows 10 1607 HwPlatformx64 Version < 10.0.14393.8148
MicrosoftWindows 10 1607 HwPlatformx86 Version < 10.0.14393.8148
MicrosoftWindows 10 1809 HwPlatformx64 Version < 10.0.17763.7434
MicrosoftWindows 10 1809 HwPlatformx86 Version < 10.0.17763.7434
MicrosoftWindows 10 21h2 Version < 10.0.19044.5965
MicrosoftWindows 10 22h2 Version < 10.0.19045.5965
MicrosoftWindows 11 22h2 Version < 10.0.22621.5472
MicrosoftWindows 11 23h2 Version < 10.0.22631.5472
MicrosoftWindows 11 24h2 Version < 10.0.26100.4270
MicrosoftWindows Server 2008 Version- Updatesp2 HwPlatformx64
MicrosoftWindows Server 2008 Version- Updatesp2 HwPlatformx86
MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
MicrosoftWindows Server 2016 Version < 10.0.14393.8148
MicrosoftWindows Server 2019 Version < 10.0.17763.7434
MicrosoftWindows Server 2022 Version < 10.0.20348.3745
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.1665
MicrosoftWindows Server 2025 Version < 10.0.26100.4270

20.10.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows SMB Client Improper Access Control Vulnerability

Schwachstelle

Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 48.37% 0.976
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secure@microsoft.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.