7.8
CVE-2025-59230
- EPSS 8.08%
- Veröffentlicht 14.10.2025 17:01:43
- Zuletzt bearbeitet 03.12.2025 13:47:09
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.21161
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.21161
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.8519
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.8519
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.7919
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.7919
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.6456
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.6456
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.6060
Microsoft ≫ Windows 11 23h2 Version <= 10.0.22631.6060
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.6899
Microsoft ≫ Windows 11 25h2 Version < 10.0.26200.6899
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx86
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version <= 10.0.14393.8519
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.7919
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.4294
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1913
Microsoft ≫ Windows Server 2025 Version <= 10.0.26100.6899
14.10.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows Improper Access Control Vulnerability
SchwachstelleMicrosoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 8.08% | 0.918 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secure@microsoft.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.