Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63946: n/a

0
High
VulnerabilityCVE-2025-63946cvecve-2025-63946
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A privilege escalation (PE) vulnerability in the Tencent PC Manager app thru 17.10.28554.205 on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:48:45 UTC

Technical Analysis

CVE-2025-63946 is a privilege escalation vulnerability identified in Tencent PC Manager, a widely used security and system optimization application for Windows devices. The flaw exists due to a race condition that can be exploited by a local user to execute arbitrary programs with elevated privileges. This race condition likely involves improper synchronization or timing issues in the application's handling of privileged operations or resource access, categorized under CWE-59 (Race Condition). The vulnerability affects versions up to 17.10.28554.205. Exploitation requires local access and precise timing to trigger the race condition, which increases the complexity of successful attacks. The CVSS v3.1 base score is 7.4, reflecting high severity with a vector indicating local attack vector (AV:L), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the potential for privilege escalation means attackers could gain full control over affected systems if exploited. This vulnerability poses a significant risk to environments where Tencent PC Manager is installed, especially in enterprise or sensitive contexts where local user accounts may be compromised or shared.

Potential Impact

The primary impact of CVE-2025-63946 is the unauthorized elevation of privileges on affected Windows systems running Tencent PC Manager. Successful exploitation allows a local attacker to execute code with elevated privileges, potentially leading to full system compromise. This undermines system confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by enabling disruptive actions such as disabling security controls or deleting critical files. Organizations relying on Tencent PC Manager for endpoint protection or system management could see their security posture severely weakened if this vulnerability is exploited. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with multiple users or where attackers have gained initial footholds. The absence of known exploits in the wild reduces immediate risk but does not preclude future attacks, particularly as details become public. The vulnerability could be leveraged in targeted attacks against high-value systems or in multi-stage attack chains to escalate privileges after initial compromise.

Mitigation Recommendations

To mitigate CVE-2025-63946, organizations should first monitor Tencent's official channels for patches or updates addressing this vulnerability and apply them promptly once available. Until a patch is released, restrict local user permissions to the minimum necessary and enforce strict access controls to prevent untrusted users from executing or modifying Tencent PC Manager components. Employ application whitelisting to block unauthorized execution of programs with elevated privileges. Use endpoint detection and response (EDR) tools to monitor for suspicious local privilege escalation attempts, particularly those involving timing anomalies or race condition exploitation patterns. Conduct regular audits of local user accounts and remove or disable unnecessary accounts to reduce the attack surface. Educate users about the risks of local privilege escalation and the importance of not running untrusted code. In environments with sensitive data, consider temporarily disabling Tencent PC Manager if feasible, or isolating affected systems until remediation is possible. Finally, implement layered security controls such as least privilege, network segmentation, and behavioral monitoring to limit the impact of any successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b41b

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 3/3/2026, 1:48:45 AM

Last updated: 4/10/2026, 1:09:50 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses