CVE-2025-26633

Published Mar 11, 2025

Last updated 5 months ago

Overview

Description
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
Source
secure@microsoft.com
NVD status
Modified
Products
windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025

Risk scores

CVSS 3.1

Type
Secondary
Base score
7
Impact score
5.9
Exploitability score
1
Vector string
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability
Exploit added on
Mar 11, 2025
Exploit action due
Apr 1, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

secure@microsoft.com
CWE-707
nvd@nist.gov
NVD-CWE-noinfo

Social media

Hype score
Not currently trending
  1. CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively exploited by Water Gamayun APT. PoC creates local admin via malicious MSC file on unpatched Windows 10/11/Server https://t.co/OlNW8nJSfu

    @MBanyamer78465

    21 Dec 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. MSC-EvilTwin-Local-Privilege-Escalation #exploit CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively exploited by Water Gamayun APT. PoC creates local admin via malicious MSC file on unpatched Windows 10/11/Server. Patched March 2... https://t.co/rldBK3JiaT

    @TheExploitLab

    17 Dec 2025

    63 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. ロシア系 APT Water Gamayun が Windows MMC のゼロデイ CVE-2025-26633 (MSC EvilTwin) を悪用。.msc/.msi 経由でバックドア/Stealer を配布、情報窃取と持続侵入。未パッチ環境は即更新を。#WaterGamayun #MSCEvilTwin #WindowsSecurity https:

    @01ra66it

    28 Nov 2025

    558 Impressions

    0 Retweets

    2 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  4. 🚨 𝐖𝐚𝐭𝐞𝐫 𝐆𝐚𝐦𝐚𝐲𝐮𝐧 𝐖𝐞𝐚𝐩𝐨𝐧𝐢𝐳𝐞𝐬 “𝐌𝐒𝐂 𝐄𝐯𝐢𝐥𝐓𝐰𝐢𝐧” 𝐙𝐞𝐫𝐨-𝐃𝐚𝐲 𝐟𝐨𝐫 𝐒𝐭𝐞𝐚𝐥𝐭𝐡𝐲 𝐁𝐚𝐜𝐤𝐝𝐨𝐨𝐫 𝐀𝐭𝐭𝐚𝐜

    @PurpleOps_io

    27 Nov 2025

    50 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Russia-aligned APT Water Gamayun exploits zero-day CVE-2025-26633, dubbed MSC EvilTwin, to stealthily inject malware via trusted Windows processes like MMC, using fake business sites to deliver payloads. #WaterGamayun #MSC_EvilTwin #Russia https://t.co/5PNrai1456

    @TweetThreatNews

    27 Nov 2025

    137 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  6. 📝 𝐖𝐚𝐭𝐞𝐫 𝐆𝐚𝐦𝐚𝐲𝐮𝐧 𝐖𝐞𝐚𝐩𝐨𝐧𝐢𝐳𝐞𝐬 &#𝟑𝟒;𝐌𝐒𝐂 𝐄𝐯𝐢𝐥𝐓𝐰𝐢𝐧&#𝟑𝟒; 𝐙𝐞𝐫𝐨-𝐃𝐚𝐲 𝐟𝐨𝐫 𝐒𝐭𝐞𝐚𝐥𝐭𝐡𝐲 𝐁𝐚𝐜𝐤𝐝𝐨𝐨𝐫

    @PurpleOps_io

    27 Nov 2025

    52 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🚨 Water Gamayun Hackers Exploit Windows MSC EvilTwin 0-Day to Inject Stealthy Malware Source: https://t.co/kgaHLV8SzD Water Gamayun, a persistent threat group, has recently intensified its efforts by exploiting a newly identified MSC EvilTwin vulnerability (CVE-2025-26633)

    @The_Cyber_News

    27 Nov 2025

    3883 Impressions

    27 Retweets

    95 Likes

    20 Bookmarks

    1 Reply

    0 Quotes

  8. Rusya yanlısı Water Gamayun, Windows MMC'deki CVE-2025-26633 açığını sömürerek yeni sızma kampanyası başlattı. Sahte Bing aramaları ve PowerShell ile gizli yükler indirip pencere gizliyor. https://t.co/fBBavY6FUU

    @siberhaberler7

    26 Nov 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. EncryptHub attackers exploit MMC CVE-2025-26633 vulnerability for payload delivery https://t.co/Bwkh0DbnlN https://t.co/XWLeyoRrbs

    @ErcanSah1n

    2 Sept 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. EncryptHub attackers exploit MMC CVE-2025-26633 vulnerability for payload delivery https://t.co/TzDCdQEE3k https://t.co/Fy8n6cDxdo

    @mayurk21

    28 Aug 2025

    62 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    28 Aug 2025

    65 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. تم رصد استغلال للثغرة CVE-2025-26633 في أنظمة Windows حيث يقوم المهاجمون بانتحال صفة موظفي الدعم الفني عبر Microsoft Teams ثم خداع الضحايا بملفات MSC مزيفة تُستخدم لنشر برم

    @jxccr07

    23 Aug 2025

    55 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  13. EncryptHub attackers exploit MMC CVE-2025-26633 vulnerability for payload delivery https://t.co/fJq3RFjul2 https://t.co/Yp28VD4K4P

    @CloudVirtues

    21 Aug 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. EncryptHub attackers exploit MMC CVE-2025-26633 vulnerability for payload delivery https://t.co/fIhpfDHh95 https://t.co/O6bdrN0sCa

    @SirajD_Official

    21 Aug 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. EncryptHub attackers exploit MMC CVE-2025-26633 vulnerability for payload delivery https://t.co/NbLZiciQ6R https://t.co/8wcnMYFqcJ

    @scandaletti

    20 Aug 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. #ThreatProtection #EncryptHub attackers exploit MMC #CVE-2025-26633 #vulnerability for payload delivery. Read more: https://t.co/fps5fQ6iDb #Cybercrime #Cybersecurity

    @threatintel

    20 Aug 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Russian threat actor EncryptHub exploits patched Windows vuln CVE-2025-26633 through social engineering and malicious MSC files to deploy Fickle Stealer malware and backdoors. They use fake IT support requests and compromised Brave Support. #cybersecurity

    @bigmacd16684

    18 Aug 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. EncryptHub is exploiting CVE-2025-26633 using fake video platforms and Brave Support to deliver malware. Payloads use AES-encrypted PowerShell, sideloaded DLLs, and SOCKS5 tunneling to evade detection. Monitor PowerShell activity and review trusted platform access. #Cyber http

    @CloneSystemsInc

    18 Aug 2025

    48 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. EncryptHub leverages social engineering calls, Microsoft Teams remote access, and CVE-2025-26633 to deploy malicious .msc files and payloads like Fickle Stealer using Golang tools and Brave Support. #MSCExploitation #BraveSupport #EncryptHub https://t.co/qOHa7TepaP

    @TweetThreatNews

    18 Aug 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. 🚨 Cybersecurity Alert Russian group EncryptHub exploits MSC EvilTwin (CVE-2025-26633) to deploy Fickle Stealer via social engineering & rogue MSC files. 🔗 https://t.co/ck8Tv6o4op #CyberSecurity #Malware #ThreatIntel #MSP #TechPIO https://t.co/RvAXSi76OA

    @techpio_team

    18 Aug 2025

    53 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Top 5 Trending CVEs: 1 - CVE-2025-32778 2 - CVE-2025-8875 3 - CVE-2025-8088 4 - CVE-2025-52970 5 - CVE-2025-26633 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    18 Aug 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Top 5 Trending CVEs: 1 - CVE-2010-5139 2 - CVE-2025-53783 3 - CVE-2025-26633 4 - CVE-2025-31324 5 - CVE-2025-52970 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    17 Aug 2025

    143 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. Cyber Alert: Hackers found a Windows bug (CVE-2025-26633). They act like IT staff on Microsoft Teams and send fake files (MSC) that install malware. ⚠️ The hackers are a Russian group called EncryptHub. 👉 Don’t open unknown files or trust random IT messages on Teams! h

    @techawarenepal

    17 Aug 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. Nation-state APT UAT-7237 breaches Taiwanese web servers with persistent methods. ERMAC v3.0 source code leak exposes Android banking trojan. Russian group EncryptHub exploits Windows CVE-2025-26633. #Taiwan #ERMAC #WindowsExploit https://t.co/wiVw5DeHb9

    @TweetThreatNews

    17 Aug 2025

    422 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  25. 🚨 New Trustwave report exposes EncryptHub’s latest campaign: social engineering + Brave Support abuse + CVE-2025-26633 (MSC EvilTwin) exploitation. Attackers impersonate IT via Teams, drop dual .msc files, and hijack MMC execution paths. https://t.co/nV5W9f1KB8 🛡️ I’

    @0x534c

    16 Aug 2025

    967 Impressions

    2 Retweets

    11 Likes

    11 Bookmarks

    0 Replies

    0 Quotes

  26. EncryptHub is exploiting the Microsoft flaw CVE-2025-26633 (“MSC EvilTwin”) using rogue MSC files and social engineering to deliver malware, warns Trustwave SpiderLabs, highlighting the need for layered defense strategies. #CyberSecurity https://t.co/s1raQNUmjT

    @Cyber_O51NT

    16 Aug 2025

    3881 Impressions

    25 Retweets

    60 Likes

    17 Bookmarks

    1 Reply

    0 Quotes

  27. 🚨ACTU CYBER🚨 @EncryptHub exploite la faille Windows CVE-2025-26633 avec des malwares furtifs et du social engineering Lien en bio pour lire la suite ! #cybersécurité https://t.co/fkUmC4ueWw

    @cybercare_fr

    16 Aug 2025

    21 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  28. 📌 تقوم مجموعة إنكريبت هاب الروسية باستغلال ثغرة أمنية تم تصحيحها في نظام ويندوز لنشر برمجيات خبيثة. رصدت Trustwave SpiderLabs حملة لإنكريبت هاب تجمع بين الهندسة ا

    @Cybercachear

    16 Aug 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. EncryptHub continues to exploit CVE-2025-26633 in Microsoft MMC, highlighting advanced cyber threat tactics. Learn more: https://t.co/UC0bQxGcxs #CyberSecurity #InfoSec

    @threatlight

    16 Aug 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. 👨‍💻 Hackers are abusing a Windows flaw (CVE-2025-26633) to drop malware—masquerading as IT staff on Microsoft Teams and tricking users with rogue MSC files. The group? EncryptHub, a Russian crew blending social engineering with zero-days. Details → https://t.co/U9ob

    @TheHackersNews

    16 Aug 2025

    79692 Impressions

    100 Retweets

    257 Likes

    102 Bookmarks

    9 Replies

    5 Quotes

  31. Trustwave SpiderLabs researchers report on an EncryptHub campaign using social engineering and Brave Support abuse to exploit the CVE-2025-26633 vulnerability for malicious payload delivery. #CyberSecurity #Malware https://t.co/1cDn7X1GC3

    @Cyber_O51NT

    14 Aug 2025

    232 Impressions

    1 Retweet

    3 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  32. Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp #CISO https://t.co/zf2nGqtEh2 https://t.co/nV1qoYZGD3

    @compuchris

    16 May 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp #CISO https://t.co/LRr7CbiYd2 https://t.co/jLDH9Gy0ev

    @compuchris

    8 May 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Trend Micro's latest report uncovers the sophisticated "Water Gamayun" cyberespionage campaign, exploiting CVE-2025-26633. With state-sponsored actors using spear-phishing and the WaterBear backdoor, vigilance is crucial. https://t.co/TCSfsjhplM

    @The4n6Analyst

    22 Apr 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    22 Apr 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  36. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    21 Apr 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  37. Water Gamayun’s campaign can lead to data breaches and financial loss. Discover how this Russian threat actor exploits a #zeroday #vulnerability in Microsoft Management Console (CVE-2025-26633) and what you can do to stay safe: ⬇️ https://t.co/Dmyt56AOM6

    @trendai_RSRCH

    21 Apr 2025

    219 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    20 Apr 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  39. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    19 Apr 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  40. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    18 Apr 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  41. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    18 Apr 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  42. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    17 Apr 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  43. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    15 Apr 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  44. Trend Research uncovers Water Gamayun’s arsenal and infrastructure. This suspected Russian threat actor exploits the CVE-2025-26633 #zeroday #vulnerability to execute malicious code and exfiltrate data from compromised systems. https://t.co/hEIZZSGZ0Z

    @TrendMicro

    15 Apr 2025

    369 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    14 Apr 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  46. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    13 Apr 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  47. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    12 Apr 2025

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  48. A Russian APT just exploited CVE-2025-26633 using a signed Windows MSC attack. Wild stuff. I broke it down + shared why penetration testing is more important than ever in today’s threat landscape. Read the blog 👇 #CyberSecurity #CVE202526633 #infosec

    @FennefLabs

    12 Apr 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  49. Actively exploited CVE : CVE-2025-26633

    @transilienceai

    12 Apr 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  50. Russian hackers exploit CVE-2025-26633 (MSC EvilTwin) to deploy SilentPrism & DarkWisp malware, stealing data with persistent backdoors. Stay vigilant & patch now! #Cybersecurity #ThreatIntel 👇 https://t.co/UmxzxsL5t7

    @_F2po_

    12 Apr 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations