CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager
Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.
AI Analysis
Technical Summary
CVE-2025-49728 is a vulnerability classified under CWE-312, which pertains to the cleartext storage of sensitive information. In this case, Microsoft PC Manager version 1.0.0 stores sensitive data in an unencrypted form on the local system. This improper handling of sensitive information allows an unauthorized local attacker to bypass certain security features by directly accessing this data. The vulnerability does not require any privileges or user interaction, making it easier for an attacker with local access to exploit. However, the attack vector is limited to local access, meaning remote exploitation is not feasible. The CVSS v3.1 score is 4.0, reflecting a medium severity due to the limited scope and impact. The vulnerability affects confidentiality but does not impact integrity or availability. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability was reserved in June 2025 and published in September 2025. The lack of patch availability necessitates interim mitigations to reduce risk.
Potential Impact
For European organizations, the primary impact of CVE-2025-49728 is the potential exposure of sensitive information stored by Microsoft PC Manager on local machines. This could lead to unauthorized disclosure of confidential data if an attacker gains physical or logical local access to affected systems. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach could facilitate further attacks or data leakage. Organizations with strict data protection regulations, such as GDPR, may face compliance risks if sensitive data is exposed. The impact is more pronounced in environments where endpoint security is weak or where multiple users share systems without proper access controls. Since exploitation requires local access, the threat is higher in scenarios involving insider threats, stolen devices, or compromised endpoints within corporate networks.
Mitigation Recommendations
To mitigate CVE-2025-49728, European organizations should implement strict local access controls, including strong authentication and user account management to prevent unauthorized physical or logical access to devices running Microsoft PC Manager 1.0.0. Employ full disk encryption and secure storage mechanisms to protect sensitive data at rest, reducing the risk posed by cleartext storage. Monitor endpoint activity for unusual access patterns or attempts to access sensitive files. Limit the use of shared or guest accounts on affected systems. Maintain an inventory of devices running Microsoft PC Manager and prioritize patching once Microsoft releases an update addressing this vulnerability. Additionally, educate users about the risks of leaving devices unattended and enforce policies for secure device handling. Consider deploying endpoint detection and response (EDR) solutions to detect potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-49728: CWE-312: Cleartext Storage of Sensitive Information in Microsoft Microsoft PC Manager
Description
Cleartext storage of sensitive information in Microsoft PC Manager allows an unauthorized attacker to bypass a security feature locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-49728 is a vulnerability classified under CWE-312, which pertains to the cleartext storage of sensitive information. In this case, Microsoft PC Manager version 1.0.0 stores sensitive data in an unencrypted form on the local system. This improper handling of sensitive information allows an unauthorized local attacker to bypass certain security features by directly accessing this data. The vulnerability does not require any privileges or user interaction, making it easier for an attacker with local access to exploit. However, the attack vector is limited to local access, meaning remote exploitation is not feasible. The CVSS v3.1 score is 4.0, reflecting a medium severity due to the limited scope and impact. The vulnerability affects confidentiality but does not impact integrity or availability. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability was reserved in June 2025 and published in September 2025. The lack of patch availability necessitates interim mitigations to reduce risk.
Potential Impact
For European organizations, the primary impact of CVE-2025-49728 is the potential exposure of sensitive information stored by Microsoft PC Manager on local machines. This could lead to unauthorized disclosure of confidential data if an attacker gains physical or logical local access to affected systems. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach could facilitate further attacks or data leakage. Organizations with strict data protection regulations, such as GDPR, may face compliance risks if sensitive data is exposed. The impact is more pronounced in environments where endpoint security is weak or where multiple users share systems without proper access controls. Since exploitation requires local access, the threat is higher in scenarios involving insider threats, stolen devices, or compromised endpoints within corporate networks.
Mitigation Recommendations
To mitigate CVE-2025-49728, European organizations should implement strict local access controls, including strong authentication and user account management to prevent unauthorized physical or logical access to devices running Microsoft PC Manager 1.0.0. Employ full disk encryption and secure storage mechanisms to protect sensitive data at rest, reducing the risk posed by cleartext storage. Monitor endpoint activity for unusual access patterns or attempts to access sensitive files. Limit the use of shared or guest accounts on affected systems. Maintain an inventory of devices running Microsoft PC Manager and prioritize patching once Microsoft releases an update addressing this vulnerability. Additionally, educate users about the risks of leaving devices unattended and enforce policies for secure device handling. Consider deploying endpoint detection and response (EDR) solutions to detect potential exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T21:23:11.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c9ac1668484133f6b9fc73
Added to database: 9/16/2025, 6:27:34 PM
Last enriched: 12/23/2025, 9:24:47 PM
Last updated: 2/7/2026, 7:17:38 AM
Views: 128
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.