Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62472: CWE-908: Use of Uninitialized Resource in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2025-62472cvecve-2025-62472cwe-908cwe-416
Published: Tue Dec 09 2025 (12/09/2025, 17:55:37 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Use of uninitialized resource in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:16:57 UTC

Technical Analysis

CVE-2025-62472 is a vulnerability classified under CWE-908 (Use of Uninitialized Resource) found in Microsoft Windows 10 Version 1607 (build 14393.0). The flaw exists within the Windows Remote Access Connection Manager component, which manages remote network connections. The vulnerability arises because the software uses a resource that has not been properly initialized before use, potentially leading to unpredictable behavior or memory corruption. An authorized local attacker can exploit this flaw to elevate their privileges on the affected system, gaining higher-level access than intended. The attack vector requires local access with at least limited privileges (PR:L), no user interaction (UI:N), and has low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (all rated high), indicating that successful exploitation could lead to full system compromise. The CVSS v3.1 base score is 7.8, reflecting a high severity level. No public exploits or patches are currently available, but the vulnerability is officially published and reserved since October 2025. Given the age of the affected Windows version, many modern systems may not be vulnerable, but legacy systems remain at risk. The vulnerability could be leveraged in targeted attacks or combined with other exploits to escalate privileges post initial compromise.

Potential Impact

The primary impact of CVE-2025-62472 is local privilege escalation, allowing an attacker with limited access to gain administrative or SYSTEM-level privileges. This can lead to full control over the affected machine, enabling installation of persistent malware, disabling security controls, or accessing sensitive data. The compromise of confidentiality, integrity, and availability is severe, as attackers can manipulate system files, intercept communications, or cause denial of service. Organizations relying on Windows 10 Version 1607, particularly in environments where local user access is not tightly controlled, face increased risk of internal threats or lateral movement by attackers. The lack of user interaction requirement facilitates stealthy exploitation. Although no known exploits are currently active, the vulnerability’s existence increases the attack surface for adversaries targeting legacy Windows systems. This can affect enterprise networks, government agencies, and critical infrastructure where older Windows versions remain in use due to compatibility or operational constraints.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later to eliminate the vulnerability. 2. If upgrading is not immediately possible, restrict local user access to trusted personnel only and enforce the principle of least privilege to minimize exposure. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities related to Remote Access Connection Manager. 4. Regularly audit and monitor logs for unusual privilege escalation attempts or anomalous behavior on systems running Windows 10 Version 1607. 5. Disable or limit the use of Remote Access Connection Manager services if not required in the environment. 6. Implement network segmentation to isolate legacy systems and reduce the risk of lateral movement. 7. Stay alert for any future patches or advisories from Microsoft and apply them promptly. 8. Conduct user training to reduce risk of local account compromise that could lead to exploitation of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-14T18:24:58.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e574ebaa3babafb394

Added to database: 12/9/2025, 6:18:13 PM

Last enriched: 3/1/2026, 12:16:57 AM

Last updated: 3/25/2026, 1:37:14 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses