Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47179: CWE-284: Improper Access Control in Microsoft Microsoft Configuration Manager

0
Medium
VulnerabilityCVE-2025-47179cvecve-2025-47179cwe-284
Published: Tue Nov 11 2025 (11/11/2025, 17:59:34 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Configuration Manager

Description

Improper access control in Microsoft Configuration Manager allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:15:27 UTC

Technical Analysis

CVE-2025-47179 is an improper access control vulnerability identified in Microsoft Configuration Manager version 1.0.0. The flaw arises from insufficient enforcement of access restrictions within the software, allowing an attacker who already has high-level privileges on a local system to escalate their privileges further. This escalation could enable the attacker to gain full administrative control, potentially compromising system confidentiality, integrity, and availability. The vulnerability does not require user interaction and is exploitable only locally, meaning the attacker must have some level of authorized access before exploitation. The CVSS v3.1 base score is 6.7, reflecting a medium severity due to the local attack vector and prerequisite privileges. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may still be pending. The vulnerability is classified under CWE-284, which pertains to improper access control, a common security weakness where software fails to restrict access to resources properly. This issue could allow attackers to bypass security controls and perform unauthorized actions within the Configuration Manager environment.

Potential Impact

The vulnerability could have significant impacts on organizations using Microsoft Configuration Manager, especially those relying on it for critical IT infrastructure management. An attacker with local high privileges could leverage this flaw to gain full administrative control, leading to unauthorized access to sensitive data, alteration or deletion of critical configurations, and disruption of IT operations. This could result in data breaches, system downtime, and loss of trust in IT management processes. Since Configuration Manager is widely used in enterprise environments for software deployment, patch management, and device configuration, exploitation could facilitate lateral movement within networks and further compromise of enterprise assets. The lack of remote exploitability reduces the attack surface but does not eliminate risk in environments where insider threats or compromised accounts exist.

Mitigation Recommendations

Organizations should implement strict access control policies to limit the number of users with high privileges on systems running Microsoft Configuration Manager. Employ the principle of least privilege to reduce the risk of privilege escalation. Monitor and audit local administrative activities closely to detect suspicious behavior. Until an official patch is released, consider isolating Configuration Manager servers and restricting local access to trusted personnel only. Use endpoint protection solutions that can detect and block privilege escalation attempts. Regularly review and update security configurations and ensure that all software components are kept up to date. Once Microsoft releases a patch, prioritize its deployment across all affected systems. Additionally, implement multi-factor authentication for administrative accounts to further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-05-01T17:10:57.981Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4747ab3590319da056

Added to database: 11/11/2025, 6:11:19 PM

Last enriched: 2/27/2026, 5:15:27 AM

Last updated: 3/26/2026, 9:20:10 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses