CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager
Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.
AI Analysis
Technical Summary
CVE-2025-49728 is a vulnerability identified in Microsoft PC Manager version 1.0.0, categorized under CWE-312, which pertains to the cleartext storage of sensitive information. This vulnerability allows an unauthorized local attacker to bypass a security feature by accessing sensitive data stored without encryption or adequate protection. Specifically, sensitive information that should be securely stored is instead saved in cleartext, making it accessible to any user or process with local access to the system. The vulnerability does not require any privileges or user interaction to exploit, and the attack vector is local (AV:L). The CVSS v3.1 base score is 4.0, indicating a medium severity level. The impact is limited to confidentiality (C:L), with no direct impact on integrity or availability. There are no known exploits in the wild, and no patches have been published at the time of this report. The vulnerability could allow attackers with local access to extract sensitive information, potentially leading to further attacks or unauthorized access to protected resources within the system. Since the vulnerability is in Microsoft PC Manager, a system management tool, the sensitive information could relate to system configurations, credentials, or other security-related data, which if exposed, could weaken the overall security posture of the affected machine.
Potential Impact
For European organizations, the impact of CVE-2025-49728 depends largely on the deployment scale of Microsoft PC Manager within their IT environments. Organizations using this tool for system management may face risks of local privilege escalation or unauthorized access to sensitive configuration data. Although the vulnerability requires local access, it could be exploited by malicious insiders or through other attack vectors that grant local system access, such as compromised endpoints or lateral movement within a network. Exposure of sensitive information could facilitate further attacks, including credential theft or bypassing security controls. This risk is particularly relevant for organizations with strict data protection requirements under GDPR, as unauthorized access to sensitive data—even locally stored—could lead to compliance issues and reputational damage. However, the medium severity and lack of known remote exploitation reduce the immediate threat level. Still, organizations should treat this vulnerability seriously, especially in environments where endpoint security is critical.
Mitigation Recommendations
To mitigate CVE-2025-49728, European organizations should implement the following specific measures: 1) Restrict local access to systems running Microsoft PC Manager by enforcing strict access controls and using endpoint protection solutions to detect unauthorized local access attempts. 2) Monitor and audit local file system access to detect unusual access patterns to sensitive files associated with Microsoft PC Manager. 3) Apply the principle of least privilege to limit the number of users and processes that can access or modify Microsoft PC Manager data. 4) Until an official patch is released, consider isolating systems running the vulnerable version or disabling Microsoft PC Manager if feasible. 5) Employ disk encryption and secure storage mechanisms to protect sensitive data at rest, reducing the risk posed by cleartext storage. 6) Educate IT staff and users about the risks of local access vulnerabilities and enforce strong endpoint security hygiene to prevent initial compromise. 7) Stay updated with Microsoft advisories for any forthcoming patches or mitigations and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager
Description
Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-49728 is a vulnerability identified in Microsoft PC Manager version 1.0.0, categorized under CWE-312, which pertains to the cleartext storage of sensitive information. This vulnerability allows an unauthorized local attacker to bypass a security feature by accessing sensitive data stored without encryption or adequate protection. Specifically, sensitive information that should be securely stored is instead saved in cleartext, making it accessible to any user or process with local access to the system. The vulnerability does not require any privileges or user interaction to exploit, and the attack vector is local (AV:L). The CVSS v3.1 base score is 4.0, indicating a medium severity level. The impact is limited to confidentiality (C:L), with no direct impact on integrity or availability. There are no known exploits in the wild, and no patches have been published at the time of this report. The vulnerability could allow attackers with local access to extract sensitive information, potentially leading to further attacks or unauthorized access to protected resources within the system. Since the vulnerability is in Microsoft PC Manager, a system management tool, the sensitive information could relate to system configurations, credentials, or other security-related data, which if exposed, could weaken the overall security posture of the affected machine.
Potential Impact
For European organizations, the impact of CVE-2025-49728 depends largely on the deployment scale of Microsoft PC Manager within their IT environments. Organizations using this tool for system management may face risks of local privilege escalation or unauthorized access to sensitive configuration data. Although the vulnerability requires local access, it could be exploited by malicious insiders or through other attack vectors that grant local system access, such as compromised endpoints or lateral movement within a network. Exposure of sensitive information could facilitate further attacks, including credential theft or bypassing security controls. This risk is particularly relevant for organizations with strict data protection requirements under GDPR, as unauthorized access to sensitive data—even locally stored—could lead to compliance issues and reputational damage. However, the medium severity and lack of known remote exploitation reduce the immediate threat level. Still, organizations should treat this vulnerability seriously, especially in environments where endpoint security is critical.
Mitigation Recommendations
To mitigate CVE-2025-49728, European organizations should implement the following specific measures: 1) Restrict local access to systems running Microsoft PC Manager by enforcing strict access controls and using endpoint protection solutions to detect unauthorized local access attempts. 2) Monitor and audit local file system access to detect unusual access patterns to sensitive files associated with Microsoft PC Manager. 3) Apply the principle of least privilege to limit the number of users and processes that can access or modify Microsoft PC Manager data. 4) Until an official patch is released, consider isolating systems running the vulnerable version or disabling Microsoft PC Manager if feasible. 5) Employ disk encryption and secure storage mechanisms to protect sensitive data at rest, reducing the risk posed by cleartext storage. 6) Educate IT staff and users about the risks of local access vulnerabilities and enforce strong endpoint security hygiene to prevent initial compromise. 7) Stay updated with Microsoft advisories for any forthcoming patches or mitigations and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T21:23:11.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c9ac1668484133f6b9fc73
Added to database: 9/16/2025, 6:27:34 PM
Last enriched: 9/16/2025, 6:28:07 PM
Last updated: 9/17/2025, 12:09:20 AM
Views: 5
Related Threats
CVE-2025-9891: CWE-352 Cross-Site Request Forgery (CSRF) in cyberlord92 User Sync
MediumCVE-2025-9851: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gentlesource Appointmind
MediumCVE-2025-9629: CWE-352 Cross-Site Request Forgery (CSRF) in shenyanzhi USS Upyun
MediumCVE-2025-8394: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in productiveminds Productive Style – Optimisations & Content Publishing Support
MediumCVE-2025-8153: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NEC Corporation UNIVERGE IX
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.