Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62474: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-62474cvecve-2025-62474cwe-284
Published: Tue Dec 09 2025 (12/09/2025, 17:55:53 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:52:35 UTC

Technical Analysis

CVE-2025-62474 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1809, specifically the Windows Remote Access Connection Manager component. The flaw allows an attacker with authorized local access to escalate their privileges to a higher level, potentially SYSTEM or administrative privileges, without requiring user interaction. The vulnerability arises due to insufficient access control checks within the Remote Access Connection Manager, enabling privilege escalation. The CVSS v3.1 base score is 7.8, indicating high severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access and low complexity, with privileges already assigned but limited, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the vulnerability's nature suggests it could be leveraged for full system compromise by malicious insiders or attackers who have gained limited local access. The affected version is Windows 10 build 17763.0, which corresponds to the 1809 release. Since this version is older, many organizations may have upgraded, but some legacy systems or specialized environments may still run it. The vulnerability was reserved in October 2025 and published in December 2025, with no patch links currently available, indicating that remediation may be pending or in progress.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors where Windows 10 Version 1809 remains operational, such as manufacturing, healthcare, or government agencies with legacy systems. Successful exploitation could allow attackers to gain administrative privileges locally, leading to full system compromise, data theft, or disruption of critical services. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and system availability could be disrupted, affecting business continuity. Given the local access requirement, insider threats or attackers who have already breached perimeter defenses could leverage this vulnerability to escalate privileges and move laterally within networks. This elevates the risk profile for organizations with insufficient endpoint security or weak internal access controls. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, as proof-of-concept or weaponized exploits may emerge.

Mitigation Recommendations

Organizations should immediately identify and inventory all systems running Windows 10 Version 1809 (build 17763.0) to assess exposure. Since no patch is currently linked, monitoring Microsoft security advisories for updates or hotfixes is critical. In the interim, restrict local access to trusted personnel only and enforce strict access controls and user account management to minimize the risk of unauthorized local access. Employ endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation attempts. Consider upgrading affected systems to a supported and patched Windows version to eliminate exposure. Network segmentation can limit lateral movement if exploitation occurs. Additionally, implement robust auditing and logging of privilege escalation events to detect potential exploitation attempts early. Educate IT staff about the vulnerability and ensure rapid incident response capabilities are in place.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-14T18:24:58.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e574ebaa3babafb39a

Added to database: 12/9/2025, 6:18:13 PM

Last enriched: 1/8/2026, 12:52:35 AM

Last updated: 2/4/2026, 2:42:37 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats