CVE-2025-47955: CWE-269: Improper Privilege Management in Microsoft Windows 10 Version 1507
Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-47955 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) within the Remote Access Connection Manager service. The flaw is categorized under CWE-269, which pertains to improper privilege management. Specifically, the vulnerability allows an attacker who already has authorized local access to escalate their privileges to a higher level, potentially SYSTEM or administrative privileges. This escalation can compromise the confidentiality, integrity, and availability of the affected system. The vulnerability does not require user interaction and has low attack complexity, meaning an attacker with local access can reliably exploit it. The CVSS v3.1 score of 7.8 reflects a high severity, with impacts rated as high across confidentiality, integrity, and availability. The scope remains unchanged, meaning the vulnerability affects only the local system. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk for environments still running this early Windows 10 version, which is no longer supported and lacks recent security updates. The absence of patch links suggests that either patches are pending or users are advised to upgrade to newer Windows versions. The vulnerability could be leveraged by malicious insiders or attackers who have gained limited local access to elevate privileges and gain full control over the system.
Potential Impact
The primary impact of CVE-2025-47955 is the potential for local privilege escalation, which can lead to full system compromise. An attacker exploiting this vulnerability can gain administrative or SYSTEM-level privileges, enabling them to install malware, modify system configurations, access sensitive data, and disrupt system operations. This can severely affect organizations by compromising endpoint security, facilitating lateral movement within networks, and undermining trust in affected systems. Since the vulnerability affects an older Windows 10 version, organizations that have not upgraded or patched their systems remain vulnerable. The impact extends to confidentiality breaches, integrity violations through unauthorized changes, and availability disruptions if attackers disable critical services or deploy ransomware. The lack of required user interaction and low complexity of exploitation increase the risk of successful attacks in environments where local access is possible, such as shared workstations, remote desktop sessions, or compromised user accounts.
Mitigation Recommendations
To mitigate CVE-2025-47955, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version, as this early build is no longer supported by Microsoft and lacks security updates. If upgrading is not immediately feasible, organizations should implement strict access controls to limit local access to trusted users only, reducing the attack surface. Employing endpoint detection and response (EDR) solutions can help detect unusual privilege escalation attempts. Regularly auditing user privileges and monitoring logs for suspicious activities related to Remote Access Connection Manager can provide early warning signs. Network segmentation can limit the impact of compromised endpoints. Additionally, organizations should stay alert for official patches or security advisories from Microsoft and apply them promptly once available. Disabling or restricting the Remote Access Connection Manager service where not required can also reduce exposure. Finally, enforcing the principle of least privilege and using multi-factor authentication for local accounts can further reduce exploitation risk.
Affected Countries
United States, China, India, Germany, Brazil, Russia, United Kingdom, France, Japan, South Korea, Canada, Australia
CVE-2025-47955: CWE-269: Improper Privilege Management in Microsoft Windows 10 Version 1507
Description
Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47955 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) within the Remote Access Connection Manager service. The flaw is categorized under CWE-269, which pertains to improper privilege management. Specifically, the vulnerability allows an attacker who already has authorized local access to escalate their privileges to a higher level, potentially SYSTEM or administrative privileges. This escalation can compromise the confidentiality, integrity, and availability of the affected system. The vulnerability does not require user interaction and has low attack complexity, meaning an attacker with local access can reliably exploit it. The CVSS v3.1 score of 7.8 reflects a high severity, with impacts rated as high across confidentiality, integrity, and availability. The scope remains unchanged, meaning the vulnerability affects only the local system. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk for environments still running this early Windows 10 version, which is no longer supported and lacks recent security updates. The absence of patch links suggests that either patches are pending or users are advised to upgrade to newer Windows versions. The vulnerability could be leveraged by malicious insiders or attackers who have gained limited local access to elevate privileges and gain full control over the system.
Potential Impact
The primary impact of CVE-2025-47955 is the potential for local privilege escalation, which can lead to full system compromise. An attacker exploiting this vulnerability can gain administrative or SYSTEM-level privileges, enabling them to install malware, modify system configurations, access sensitive data, and disrupt system operations. This can severely affect organizations by compromising endpoint security, facilitating lateral movement within networks, and undermining trust in affected systems. Since the vulnerability affects an older Windows 10 version, organizations that have not upgraded or patched their systems remain vulnerable. The impact extends to confidentiality breaches, integrity violations through unauthorized changes, and availability disruptions if attackers disable critical services or deploy ransomware. The lack of required user interaction and low complexity of exploitation increase the risk of successful attacks in environments where local access is possible, such as shared workstations, remote desktop sessions, or compromised user accounts.
Mitigation Recommendations
To mitigate CVE-2025-47955, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version, as this early build is no longer supported by Microsoft and lacks security updates. If upgrading is not immediately feasible, organizations should implement strict access controls to limit local access to trusted users only, reducing the attack surface. Employing endpoint detection and response (EDR) solutions can help detect unusual privilege escalation attempts. Regularly auditing user privileges and monitoring logs for suspicious activities related to Remote Access Connection Manager can provide early warning signs. Network segmentation can limit the impact of compromised endpoints. Additionally, organizations should stay alert for official patches or security advisories from Microsoft and apply them promptly once available. Disabling or restricting the Remote Access Connection Manager service where not required can also reduce exposure. Finally, enforcing the principle of least privilege and using multi-factor authentication for local accounts can further reduce exploitation risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-05-14T14:13:13.464Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f521b0bd07c39389c5d
Added to database: 6/10/2025, 6:54:10 PM
Last enriched: 2/21/2026, 9:12:17 PM
Last updated: 3/21/2026, 1:16:36 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.