Skip to main content

CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager

Medium
VulnerabilityCVE-2025-49728cvecve-2025-49728cwe-312
Published: Tue Sep 16 2025 (09/16/2025, 18:13:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft PC Manager

Description

Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.

AI-Powered Analysis

AILast updated: 09/16/2025, 18:28:07 UTC

Technical Analysis

CVE-2025-49728 is a vulnerability identified in Microsoft PC Manager version 1.0.0, categorized under CWE-312, which pertains to the cleartext storage of sensitive information. This vulnerability allows an unauthorized local attacker to bypass a security feature by accessing sensitive data stored without encryption or adequate protection. Specifically, sensitive information that should be securely stored is instead saved in cleartext, making it accessible to any user or process with local access to the system. The vulnerability does not require any privileges or user interaction to exploit, and the attack vector is local (AV:L). The CVSS v3.1 base score is 4.0, indicating a medium severity level. The impact is limited to confidentiality (C:L), with no direct impact on integrity or availability. There are no known exploits in the wild, and no patches have been published at the time of this report. The vulnerability could allow attackers with local access to extract sensitive information, potentially leading to further attacks or unauthorized access to protected resources within the system. Since the vulnerability is in Microsoft PC Manager, a system management tool, the sensitive information could relate to system configurations, credentials, or other security-related data, which if exposed, could weaken the overall security posture of the affected machine.

Potential Impact

For European organizations, the impact of CVE-2025-49728 depends largely on the deployment scale of Microsoft PC Manager within their IT environments. Organizations using this tool for system management may face risks of local privilege escalation or unauthorized access to sensitive configuration data. Although the vulnerability requires local access, it could be exploited by malicious insiders or through other attack vectors that grant local system access, such as compromised endpoints or lateral movement within a network. Exposure of sensitive information could facilitate further attacks, including credential theft or bypassing security controls. This risk is particularly relevant for organizations with strict data protection requirements under GDPR, as unauthorized access to sensitive data—even locally stored—could lead to compliance issues and reputational damage. However, the medium severity and lack of known remote exploitation reduce the immediate threat level. Still, organizations should treat this vulnerability seriously, especially in environments where endpoint security is critical.

Mitigation Recommendations

To mitigate CVE-2025-49728, European organizations should implement the following specific measures: 1) Restrict local access to systems running Microsoft PC Manager by enforcing strict access controls and using endpoint protection solutions to detect unauthorized local access attempts. 2) Monitor and audit local file system access to detect unusual access patterns to sensitive files associated with Microsoft PC Manager. 3) Apply the principle of least privilege to limit the number of users and processes that can access or modify Microsoft PC Manager data. 4) Until an official patch is released, consider isolating systems running the vulnerable version or disabling Microsoft PC Manager if feasible. 5) Employ disk encryption and secure storage mechanisms to protect sensitive data at rest, reducing the risk posed by cleartext storage. 6) Educate IT staff and users about the risks of local access vulnerabilities and enforce strong endpoint security hygiene to prevent initial compromise. 7) Stay updated with Microsoft advisories for any forthcoming patches or mitigations and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T21:23:11.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c9ac1668484133f6b9fc73

Added to database: 9/16/2025, 6:27:34 PM

Last enriched: 9/16/2025, 6:28:07 PM

Last updated: 9/17/2025, 12:09:20 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats