Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64669: CWE-284: Improper Access Control in Microsoft Windows Admin Center

0
High
VulnerabilityCVE-2025-64669cvecve-2025-64669cwe-284
Published: Thu Dec 11 2025 (12/11/2025, 18:06:13 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Admin Center

Description

Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:38:52 UTC

Technical Analysis

CVE-2025-64669 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows Admin Center version 1809.0. Windows Admin Center is a web-based management tool for Windows servers and infrastructure. The vulnerability allows an attacker who already has some level of authorized local access to escalate their privileges to a higher level, potentially gaining administrative rights. The issue stems from improper enforcement of access control policies within the application, which fails to adequately restrict certain privileged operations. The CVSS 3.1 base score is 7.8, indicating a high severity, with the vector showing that the attack requires local access (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no exploits are currently known in the wild, the vulnerability poses a significant risk if leveraged by malicious insiders or attackers who have gained limited local access. The lack of a patch at the time of disclosure necessitates immediate mitigation through access restrictions and monitoring. This vulnerability is particularly concerning for environments where Windows Admin Center is used to manage critical infrastructure, as privilege escalation can lead to full system compromise and lateral movement within networks.

Potential Impact

For European organizations, this vulnerability could lead to severe consequences including unauthorized access to sensitive data, disruption of critical services, and potential full compromise of managed Windows environments. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Windows Admin Center for server and network management are at heightened risk. The ability for an attacker with limited local privileges to escalate to administrative rights could facilitate data breaches, ransomware deployment, or sabotage of IT operations. Given the widespread use of Microsoft management tools across Europe, the vulnerability could impact a broad range of enterprises and public sector entities. The lack of user interaction requirement increases the risk of automated or stealthy exploitation once local access is obtained. This could undermine trust in IT management platforms and lead to costly incident response and remediation efforts.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict local access controls to limit who can log into systems running Windows Admin Center 1809.0. This includes enforcing least privilege principles, using multi-factor authentication for local accounts where possible, and restricting physical and remote access to trusted personnel only. Monitoring and alerting for unusual privilege escalation activities or access patterns on systems running Windows Admin Center should be enhanced. Network segmentation can help contain potential compromises by isolating management servers from general user networks. Organizations should prepare to deploy patches promptly once available and validate the integrity of Windows Admin Center installations. Additionally, reviewing and hardening Windows Admin Center configurations and auditing user permissions regularly will reduce the attack surface. Employing endpoint detection and response (EDR) solutions to detect suspicious local privilege escalation attempts can provide early warning of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-06T23:40:37.276Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b0c4e7d4c6f31f7befd44

Added to database: 12/11/2025, 6:24:14 PM

Last enriched: 12/11/2025, 6:38:52 PM

Last updated: 12/12/2025, 3:09:08 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats