CVE-2025-59230: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-59230 is a vulnerability classified under CWE-284 (Improper Access Control) found in the Windows Remote Access Connection Manager component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an attacker with authorized local access to elevate their privileges to SYSTEM level due to insufficient access control enforcement within the component. The vulnerability does not require user interaction and can be exploited with low complexity, given the attacker already has some level of local access (PR:L). The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C) indicates that the attack is local, requires low attack complexity, and privileges, but no user interaction. The impact on confidentiality, integrity, and availability is high, as the attacker can gain full control over the affected system. Although no public exploits are currently known, the vulnerability is critical for environments where Windows 10 Version 1809 is still deployed, especially in enterprise and industrial contexts. The flaw stems from improper access control mechanisms in the Remote Access Connection Manager, which manages VPN and dial-up connections, potentially allowing privilege escalation through crafted local actions. The vulnerability was reserved on 2025-09-11 and published on 2025-10-14, with no patch links currently available, indicating that mitigation options may be limited until official updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly in sectors where Windows 10 Version 1809 remains in use, such as manufacturing, healthcare, and government agencies with legacy systems. Successful exploitation could allow attackers to bypass local privilege restrictions, leading to full system compromise, data theft, or disruption of critical services. The ability to escalate privileges locally can facilitate lateral movement within networks, increasing the risk of widespread breaches. Confidentiality, integrity, and availability of sensitive data and systems could be severely impacted. Organizations relying on remote access technologies managed by the vulnerable component are especially at risk. Additionally, the lack of current patches increases exposure time, necessitating immediate compensating controls. The threat is amplified in environments with multiple users sharing systems or where endpoint security is weak. This vulnerability could also be leveraged in targeted attacks against European critical infrastructure, given the strategic importance of such systems.
Mitigation Recommendations
Until official patches are released, European organizations should implement strict local access controls to limit the number of users with local privileges on Windows 10 Version 1809 systems. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious privilege escalation attempts. Disable or restrict the use of the Windows Remote Access Connection Manager service where feasible, especially on systems not requiring VPN or dial-up connections. Enforce the principle of least privilege rigorously and audit local user accounts regularly. Network segmentation can reduce the risk of lateral movement if a system is compromised. Maintain up-to-date backups and prepare incident response plans focused on privilege escalation scenarios. Once Microsoft releases patches, prioritize their deployment on all affected systems. Additionally, consider upgrading affected systems to supported Windows versions with active security updates to reduce exposure to this and other vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2025-59230: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809
Description
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-59230 is a vulnerability classified under CWE-284 (Improper Access Control) found in the Windows Remote Access Connection Manager component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an attacker with authorized local access to elevate their privileges to SYSTEM level due to insufficient access control enforcement within the component. The vulnerability does not require user interaction and can be exploited with low complexity, given the attacker already has some level of local access (PR:L). The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C) indicates that the attack is local, requires low attack complexity, and privileges, but no user interaction. The impact on confidentiality, integrity, and availability is high, as the attacker can gain full control over the affected system. Although no public exploits are currently known, the vulnerability is critical for environments where Windows 10 Version 1809 is still deployed, especially in enterprise and industrial contexts. The flaw stems from improper access control mechanisms in the Remote Access Connection Manager, which manages VPN and dial-up connections, potentially allowing privilege escalation through crafted local actions. The vulnerability was reserved on 2025-09-11 and published on 2025-10-14, with no patch links currently available, indicating that mitigation options may be limited until official updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly in sectors where Windows 10 Version 1809 remains in use, such as manufacturing, healthcare, and government agencies with legacy systems. Successful exploitation could allow attackers to bypass local privilege restrictions, leading to full system compromise, data theft, or disruption of critical services. The ability to escalate privileges locally can facilitate lateral movement within networks, increasing the risk of widespread breaches. Confidentiality, integrity, and availability of sensitive data and systems could be severely impacted. Organizations relying on remote access technologies managed by the vulnerable component are especially at risk. Additionally, the lack of current patches increases exposure time, necessitating immediate compensating controls. The threat is amplified in environments with multiple users sharing systems or where endpoint security is weak. This vulnerability could also be leveraged in targeted attacks against European critical infrastructure, given the strategic importance of such systems.
Mitigation Recommendations
Until official patches are released, European organizations should implement strict local access controls to limit the number of users with local privileges on Windows 10 Version 1809 systems. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious privilege escalation attempts. Disable or restrict the use of the Windows Remote Access Connection Manager service where feasible, especially on systems not requiring VPN or dial-up connections. Enforce the principle of least privilege rigorously and audit local user accounts regularly. Network segmentation can reduce the risk of lateral movement if a system is compromised. Maintain up-to-date backups and prepare incident response plans focused on privilege escalation scenarios. Once Microsoft releases patches, prioritize their deployment on all affected systems. Additionally, consider upgrading affected systems to supported Windows versions with active security updates to reduce exposure to this and other vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-11T00:32:30.952Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee858d3dd1bfb0b7e41c36
Added to database: 10/14/2025, 5:17:01 PM
Last enriched: 11/27/2025, 3:00:33 AM
Last updated: 11/28/2025, 5:42:51 PM
Views: 133
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13683: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Devolutions Server
HighCVE-2024-23683
HighCVE-2024-23682: CWE-501 Trust Boundary Violation
HighCVE-2024-21908: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
MediumCVE-2023-30802: CWE-540: Inclusion of Sensitive Information in Source Code in Sangfor Net-Gen Application Firewall
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.