Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50173: CWE-1390: Weak Authentication in Microsoft Multimedia Redirection Installer

0
High
VulnerabilityCVE-2025-50173cvecve-2025-50173cwe-1390
Published: Tue Aug 12 2025 (08/12/2025, 17:10:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Multimedia Redirection Installer

Description

Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/14/2025, 06:33:31 UTC

Technical Analysis

CVE-2025-50173 is a vulnerability classified under CWE-1390, indicating weak authentication in the Microsoft Multimedia Redirection Installer version 1.0.2. The weakness lies in the installer’s authentication process, which fails to adequately verify the privileges of a local user attempting to perform installation or modification tasks. An attacker with authorized local access but limited privileges can exploit this flaw to elevate their privileges to a higher level, potentially SYSTEM or administrator level, without requiring user interaction. This elevation of privilege (EoP) can lead to full control over the affected system, allowing the attacker to execute arbitrary code, access sensitive information, or disrupt system operations. The vulnerability has a CVSS v3.1 base score of 7.8, reflecting high severity due to its impact on confidentiality, integrity, and availability (all rated high), low attack complexity, and the requirement of only limited privileges without user interaction. Although no public exploits are known at this time, the vulnerability’s presence in a Microsoft component widely used in Windows environments makes it a significant threat. The Multimedia Redirection Installer is typically used in environments where multimedia content is redirected or managed, such as virtual desktop infrastructure (VDI) or remote desktop services, increasing the potential attack surface in enterprise settings. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through access control and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-50173 can be substantial. Privilege escalation vulnerabilities enable attackers to bypass security controls, potentially leading to full system compromise. This can result in unauthorized access to sensitive corporate data, disruption of critical services, and the deployment of malware or ransomware. Organizations relying on Windows-based multimedia redirection features, especially in sectors like finance, healthcare, government, and critical infrastructure, face increased risk. The vulnerability could facilitate lateral movement within networks, undermining defense-in-depth strategies. Additionally, the absence of user interaction requirements lowers the barrier for exploitation, increasing the likelihood of successful attacks in environments where local access is possible. The potential for high confidentiality, integrity, and availability impacts means that data breaches, operational downtime, and reputational damage are realistic consequences. European data protection regulations such as GDPR also heighten the stakes, as breaches involving personal data could lead to significant fines and legal repercussions.

Mitigation Recommendations

Given that no patches are currently available, European organizations should implement the following specific mitigations: 1) Restrict local access to systems running the affected Multimedia Redirection Installer, ensuring only trusted administrators have login privileges. 2) Employ application whitelisting and endpoint protection solutions to monitor and block unauthorized execution of installer components. 3) Use Windows security features such as User Account Control (UAC) and Local Group Policy to enforce least privilege principles and limit the ability of users to install or modify software. 4) Monitor system logs and audit events related to installer execution and privilege escalation attempts to detect suspicious activity early. 5) In virtualized or remote desktop environments, isolate multimedia redirection services on dedicated, hardened hosts to reduce attack surface. 6) Prepare for rapid deployment of official patches from Microsoft by maintaining an up-to-date asset inventory and patch management process. 7) Conduct user awareness training to ensure that authorized users understand the risks of local privilege escalation and the importance of secure credential management. These measures, combined, reduce the likelihood of successful exploitation until a patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-13T18:35:16.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774bad5a09ad00349181

Added to database: 8/12/2025, 5:18:03 PM

Last enriched: 11/14/2025, 6:33:31 AM

Last updated: 11/30/2025, 8:11:11 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats