Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47955: CWE-269: Improper Privilege Management in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-47955cvecve-2025-47955cwe-269
Published: Tue Jun 10 2025 (06/10/2025, 17:02:25 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:12:17 UTC

Technical Analysis

CVE-2025-47955 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) within the Remote Access Connection Manager service. The flaw is categorized under CWE-269, which pertains to improper privilege management. Specifically, the vulnerability allows an attacker who already has authorized local access to escalate their privileges to a higher level, potentially SYSTEM or administrative privileges. This escalation can compromise the confidentiality, integrity, and availability of the affected system. The vulnerability does not require user interaction and has low attack complexity, meaning an attacker with local access can reliably exploit it. The CVSS v3.1 score of 7.8 reflects a high severity, with impacts rated as high across confidentiality, integrity, and availability. The scope remains unchanged, meaning the vulnerability affects only the local system. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk for environments still running this early Windows 10 version, which is no longer supported and lacks recent security updates. The absence of patch links suggests that either patches are pending or users are advised to upgrade to newer Windows versions. The vulnerability could be leveraged by malicious insiders or attackers who have gained limited local access to elevate privileges and gain full control over the system.

Potential Impact

The primary impact of CVE-2025-47955 is the potential for local privilege escalation, which can lead to full system compromise. An attacker exploiting this vulnerability can gain administrative or SYSTEM-level privileges, enabling them to install malware, modify system configurations, access sensitive data, and disrupt system operations. This can severely affect organizations by compromising endpoint security, facilitating lateral movement within networks, and undermining trust in affected systems. Since the vulnerability affects an older Windows 10 version, organizations that have not upgraded or patched their systems remain vulnerable. The impact extends to confidentiality breaches, integrity violations through unauthorized changes, and availability disruptions if attackers disable critical services or deploy ransomware. The lack of required user interaction and low complexity of exploitation increase the risk of successful attacks in environments where local access is possible, such as shared workstations, remote desktop sessions, or compromised user accounts.

Mitigation Recommendations

To mitigate CVE-2025-47955, organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version, as this early build is no longer supported by Microsoft and lacks security updates. If upgrading is not immediately feasible, organizations should implement strict access controls to limit local access to trusted users only, reducing the attack surface. Employing endpoint detection and response (EDR) solutions can help detect unusual privilege escalation attempts. Regularly auditing user privileges and monitoring logs for suspicious activities related to Remote Access Connection Manager can provide early warning signs. Network segmentation can limit the impact of compromised endpoints. Additionally, organizations should stay alert for official patches or security advisories from Microsoft and apply them promptly once available. Disabling or restricting the Remote Access Connection Manager service where not required can also reduce exposure. Finally, enforcing the principle of least privilege and using multi-factor authentication for local accounts can further reduce exploitation risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.464Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f521b0bd07c39389c5d

Added to database: 6/10/2025, 6:54:10 PM

Last enriched: 2/21/2026, 9:12:17 PM

Last updated: 3/21/2026, 1:16:36 AM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses