Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager

0
Medium
VulnerabilityCVE-2025-49728cvecve-2025-49728cwe-312
Published: Tue Sep 16 2025 (09/16/2025, 18:13:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft PC Manager

Description

Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:24:47 UTC

Technical Analysis

CVE-2025-49728 is a vulnerability classified under CWE-312, which pertains to the cleartext storage of sensitive information. In this case, Microsoft PC Manager version 1.0.0 stores sensitive data in an unencrypted form on the local system. This improper handling of sensitive information allows an unauthorized local attacker to bypass certain security features by directly accessing this data. The vulnerability does not require any privileges or user interaction, making it easier for an attacker with local access to exploit. However, the attack vector is limited to local access, meaning remote exploitation is not feasible. The CVSS v3.1 score is 4.0, reflecting a medium severity due to the limited scope and impact. The vulnerability affects confidentiality but does not impact integrity or availability. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability was reserved in June 2025 and published in September 2025. The lack of patch availability necessitates interim mitigations to reduce risk.

Potential Impact

For European organizations, the primary impact of CVE-2025-49728 is the potential exposure of sensitive information stored by Microsoft PC Manager on local machines. This could lead to unauthorized disclosure of confidential data if an attacker gains physical or logical local access to affected systems. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach could facilitate further attacks or data leakage. Organizations with strict data protection regulations, such as GDPR, may face compliance risks if sensitive data is exposed. The impact is more pronounced in environments where endpoint security is weak or where multiple users share systems without proper access controls. Since exploitation requires local access, the threat is higher in scenarios involving insider threats, stolen devices, or compromised endpoints within corporate networks.

Mitigation Recommendations

To mitigate CVE-2025-49728, European organizations should implement strict local access controls, including strong authentication and user account management to prevent unauthorized physical or logical access to devices running Microsoft PC Manager 1.0.0. Employ full disk encryption and secure storage mechanisms to protect sensitive data at rest, reducing the risk posed by cleartext storage. Monitor endpoint activity for unusual access patterns or attempts to access sensitive files. Limit the use of shared or guest accounts on affected systems. Maintain an inventory of devices running Microsoft PC Manager and prioritize patching once Microsoft releases an update addressing this vulnerability. Additionally, educate users about the risks of leaving devices unattended and enforce policies for secure device handling. Consider deploying endpoint detection and response (EDR) solutions to detect potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T21:23:11.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c9ac1668484133f6b9fc73

Added to database: 9/16/2025, 6:27:34 PM

Last enriched: 12/23/2025, 9:24:47 PM

Last updated: 2/7/2026, 7:17:38 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats