7.8

CVE-2025-59230

Warnung
Medienbericht
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrosoftWindows 10 1507 HwPlatformx64 Version < 10.0.10240.21161
MicrosoftWindows 10 1507 HwPlatformx86 Version < 10.0.10240.21161
MicrosoftWindows 10 1607 HwPlatformx64 Version < 10.0.14393.8519
MicrosoftWindows 10 1607 HwPlatformx86 Version < 10.0.14393.8519
MicrosoftWindows 10 1809 HwPlatformx64 Version < 10.0.17763.7919
MicrosoftWindows 10 1809 HwPlatformx86 Version < 10.0.17763.7919
MicrosoftWindows 10 21h2 Version < 10.0.19044.6456
MicrosoftWindows 10 22h2 Version < 10.0.19045.6456
MicrosoftWindows 11 22h2 Version < 10.0.22621.6060
MicrosoftWindows 11 23h2 Version <= 10.0.22631.6060
MicrosoftWindows 11 24h2 Version < 10.0.26100.6899
MicrosoftWindows 11 25h2 Version < 10.0.26200.6899
MicrosoftWindows Server 2008 Version- Updatesp2 HwPlatformx64
MicrosoftWindows Server 2008 Version- Updatesp2 HwPlatformx86
MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
MicrosoftWindows Server 2016 Version <= 10.0.14393.8519
MicrosoftWindows Server 2019 Version < 10.0.17763.7919
MicrosoftWindows Server 2022 Version < 10.0.20348.4294
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.1913
MicrosoftWindows Server 2025 Version <= 10.0.26100.6899

14.10.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows Improper Access Control Vulnerability

Schwachstelle

Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 8.08% 0.918
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secure@microsoft.com 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.