AI description
CVE-2025-47955 is an elevation of privilege vulnerability affecting the Windows Remote Access Connection Manager. Disclosed on June 10, 2025, as part of Microsoft's June 2025 Patch Tuesday updates, it allows an authorized attacker with local access to elevate their privileges on affected Windows systems. The vulnerability is due to improper privilege management and has a CVSS v3.1 base score of 7.8 (High). Successful exploitation could lead to a complete compromise of confidentiality, integrity, and availability of the targeted system. Microsoft has released a security update to address this vulnerability.
- Description
- Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
- Products
- windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-269
- Hype score
- Not currently trending
Positive Technologies помогла исправить уязвимость в Windows Специалист PT SWARM Сергей Близнюк обнаружил уязвимость CVE-2025-47955, затрагивавшую 37 продуктов Microsoft. Уязвимос
@pc7ooo
28 Jul 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Positive Technologies помогла исправить уязвимость в Windows Специалист PT SWARM Сергей Близнюк обнаружил уязвимость CVE-2025-47955, затрагивавшую 37 продуктов Microsoft (включая а
@XakepRU
28 Jul 2025
510 Impressions
1 Retweet
1 Like
2 Bookmarks
0 Replies
0 Quotes
The following vulnerabilities have been added to our feed: - CVE-2025-32756: multiple Fortinet products Buffer Overflow RCE - CVE-2025-47955: Windows RasMan LPE - CVE-2025-1758: Kemp LoadMaster Stack Overflow DoS https://t.co/Nw6eZdt4CA https://t.co/85uWHVU04L
@crowdfense
26 Jun 2025
7113 Impressions
7 Retweets
35 Likes
21 Bookmarks
0 Replies
2 Quotes
🔥 Microsoft fixed CVE-2025-47955, discovered by our researcher Sergey Bliznyuk! This vulnerability allows a locally authenticated attacker to elevate privileges to SYSTEM via the Windows RasMan service. 🔗 Advisory: https://t.co/4aufMgoVTl https://t.co/jobat5h1mO
@ptswarm
17 Jun 2025
9127 Impressions
43 Retweets
125 Likes
48 Bookmarks
0 Replies
1 Quote
CVE-2025-47955 Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. https://t.co/GvJSNvouln
@CVEnew
10 Jun 2025
172 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "0B6B5CAA-8A5A-4676-BC01-CD97BDCE5763",
"versionEndExcluding": "10.0.10240.21014"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "4E77111E-B41A-4E88-AC0B-2EBEC9E042FF",
"versionEndExcluding": "10.0.10240.21014"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "A725E104-8456-4AE8-9A9D-10127FC36BDE",
"versionEndExcluding": "10.0.14393.8066"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "4720EC2C-1371-4D1F-80E6-7804D079C183",
"versionEndExcluding": "10.0.14393.8066"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "63199B82-79B6-461A-AC6D-CD1EE5EBCC80",
"versionEndExcluding": "10.0.17763.7314"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "C7D99F6B-B97B-4010-AA5C-84E9FE50D860",
"versionEndExcluding": "10.0.17763.7314"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "87D3BE2A-EF7B-4653-AE64-9F8FE0E12223",
"versionEndExcluding": "10.0.19044.5854"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6F95690D-5720-4ACD-A378-BC3040E42AF2",
"versionEndExcluding": "10.0.19045.5854"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9929270C-5F72-40B8-B36B-073E6D1B00B6",
"versionEndExcluding": "10.0.22621.5335"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "894FA410-3F24-45CB-B347-3F839CBA8DD8",
"versionEndExcluding": "10.0.22631.5335"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DC3BBF09-46EB-4B45-857A-705C45143AE8",
"versionEndExcluding": "10.0.26100.3981"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "91433700-DB90-4524-8FAE-FF3895C2A45F",
"versionEndExcluding": "10.0.14393.8066"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1B47EE2B-4081-4D43-8AF7-C8EB11852312",
"versionEndExcluding": "10.0.17763.7314"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "72716E6E-C4C5-43A0-A1B2-ECD583D2BC72",
"versionEndExcluding": "10.0.20348.3630"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2B9B2720-3733-4C50-85F7-156D781D15B8",
"versionEndExcluding": "10.0.25398.1611"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "56235620-A112-4BAB-A379-DF0FA479D5B4",
"versionEndExcluding": "10.0.26100.3981"
}
],
"operator": "OR"
}
]
}
]