CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager
Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.
AI Analysis
Technical Summary
CVE-2025-49728 is a vulnerability identified in Microsoft PC Manager version 1.0.0, categorized under CWE-312, which concerns the cleartext storage of sensitive information. The vulnerability arises because sensitive data within the application is stored on disk or in memory without encryption or adequate protection, allowing unauthorized local attackers to access this information directly. This exposure can enable attackers to bypass certain security features that rely on the confidentiality of this data, potentially undermining the security posture of the affected system. The vulnerability does not require any privileges or user interaction to exploit, but it does require local access to the affected machine. The CVSS v3.1 base score is 4.0, reflecting a medium severity level primarily due to the limited attack vector (local) and the impact being confined to confidentiality loss without affecting integrity or availability. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved in June 2025 and published in September 2025, indicating recent discovery and disclosure. Given the nature of the vulnerability, it is critical for organizations to understand the risk of sensitive data exposure on endpoints running Microsoft PC Manager and to implement controls to limit local access and monitor for potential misuse.
Potential Impact
The primary impact of CVE-2025-49728 is the compromise of confidentiality due to the cleartext storage of sensitive information. Unauthorized local attackers can access this data, potentially bypassing security mechanisms that depend on its secrecy. While the vulnerability does not affect data integrity or system availability, the exposure of sensitive information can lead to further attacks, such as privilege escalation or lateral movement within an organization’s network. Organizations worldwide using Microsoft PC Manager on endpoints face risks of data leakage, especially in environments where local access controls are weak or where multiple users share systems. The lack of required privileges or user interaction lowers the barrier for exploitation by insiders or attackers with physical or remote local access. Although no exploits are currently known in the wild, the vulnerability could be leveraged in targeted attacks against organizations with valuable data or critical infrastructure. The medium severity rating suggests a moderate risk, but the actual impact depends on the sensitivity of the stored information and the security posture of the affected environment.
Mitigation Recommendations
To mitigate CVE-2025-49728 effectively, organizations should implement the following specific measures: 1) Restrict local access to systems running Microsoft PC Manager by enforcing strict physical security controls and limiting user accounts with local login privileges. 2) Employ endpoint detection and response (EDR) tools to monitor for unusual access patterns or attempts to read sensitive files associated with PC Manager. 3) Use full disk encryption and secure storage solutions to reduce the risk of data exposure even if cleartext storage occurs at the application level. 4) Regularly audit and review local user permissions and remove unnecessary accounts or privileges to minimize attack surface. 5) Until an official patch is released, consider isolating or limiting the deployment of Microsoft PC Manager in high-risk environments. 6) Educate users and administrators about the risks of local data exposure and encourage prompt reporting of suspicious activity. 7) Monitor Microsoft’s security advisories for updates or patches addressing this vulnerability and apply them promptly once available. These targeted actions go beyond generic advice by focusing on controlling local access and enhancing detection capabilities specific to the nature of this vulnerability.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Mexico, Netherlands, Italy, Spain
CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager
Description
Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-49728 is a vulnerability identified in Microsoft PC Manager version 1.0.0, categorized under CWE-312, which concerns the cleartext storage of sensitive information. The vulnerability arises because sensitive data within the application is stored on disk or in memory without encryption or adequate protection, allowing unauthorized local attackers to access this information directly. This exposure can enable attackers to bypass certain security features that rely on the confidentiality of this data, potentially undermining the security posture of the affected system. The vulnerability does not require any privileges or user interaction to exploit, but it does require local access to the affected machine. The CVSS v3.1 base score is 4.0, reflecting a medium severity level primarily due to the limited attack vector (local) and the impact being confined to confidentiality loss without affecting integrity or availability. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved in June 2025 and published in September 2025, indicating recent discovery and disclosure. Given the nature of the vulnerability, it is critical for organizations to understand the risk of sensitive data exposure on endpoints running Microsoft PC Manager and to implement controls to limit local access and monitor for potential misuse.
Potential Impact
The primary impact of CVE-2025-49728 is the compromise of confidentiality due to the cleartext storage of sensitive information. Unauthorized local attackers can access this data, potentially bypassing security mechanisms that depend on its secrecy. While the vulnerability does not affect data integrity or system availability, the exposure of sensitive information can lead to further attacks, such as privilege escalation or lateral movement within an organization’s network. Organizations worldwide using Microsoft PC Manager on endpoints face risks of data leakage, especially in environments where local access controls are weak or where multiple users share systems. The lack of required privileges or user interaction lowers the barrier for exploitation by insiders or attackers with physical or remote local access. Although no exploits are currently known in the wild, the vulnerability could be leveraged in targeted attacks against organizations with valuable data or critical infrastructure. The medium severity rating suggests a moderate risk, but the actual impact depends on the sensitivity of the stored information and the security posture of the affected environment.
Mitigation Recommendations
To mitigate CVE-2025-49728 effectively, organizations should implement the following specific measures: 1) Restrict local access to systems running Microsoft PC Manager by enforcing strict physical security controls and limiting user accounts with local login privileges. 2) Employ endpoint detection and response (EDR) tools to monitor for unusual access patterns or attempts to read sensitive files associated with PC Manager. 3) Use full disk encryption and secure storage solutions to reduce the risk of data exposure even if cleartext storage occurs at the application level. 4) Regularly audit and review local user permissions and remove unnecessary accounts or privileges to minimize attack surface. 5) Until an official patch is released, consider isolating or limiting the deployment of Microsoft PC Manager in high-risk environments. 6) Educate users and administrators about the risks of local data exposure and encourage prompt reporting of suspicious activity. 7) Monitor Microsoft’s security advisories for updates or patches addressing this vulnerability and apply them promptly once available. These targeted actions go beyond generic advice by focusing on controlling local access and enhancing detection capabilities specific to the nature of this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T21:23:11.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c9ac1668484133f6b9fc73
Added to database: 9/16/2025, 6:27:34 PM
Last enriched: 2/21/2026, 9:15:44 PM
Last updated: 3/24/2026, 1:47:32 AM
Views: 140
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.