CVE-2025-59230
📊 7.8 HIGH⚡ 1.5%🎯 0 exploits🏛️ KEV Listed
📅 Published Oct 14, 2025
📋 Status: Analyzed
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CVSS v3.1 • [email protected]
🎯 Affected Products & Systems
22 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String | 
|---|---|---|---|---|---|
| 💻OS | microsoft | windows 10 1507 | < 10.0.10240.21161 Target HW: x64 | Vulnerable | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* | 
| 💻OS | microsoft | windows 10 1507 | < 10.0.10240.21161 Target HW: x86 | Vulnerable | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* | 
| 💻OS | microsoft | windows 10 1607 | < 10.0.14393.8519 Target HW: x64 | Vulnerable | cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* | 
| 💻OS | microsoft | windows 10 1607 | < 10.0.14393.8519 Target HW: x86 | Vulnerable | cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* | 
| 💻OS | microsoft | windows 10 1809 | < 10.0.17763.7919 Target HW: x64 | Vulnerable | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | 
| 💻OS | microsoft | windows 10 1809 | < 10.0.17763.7919 Target HW: x86 | Vulnerable | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* | 
| 💻OS | microsoft | windows 10 21h2 | < 10.0.19044.6456 | Vulnerable | cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows 10 22h2 | < 10.0.19045.6456 | Vulnerable | cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows 11 22h2 | < 10.0.22621.6060 | Vulnerable | cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows 11 23h2 | ≤ 10.0.22631.6060 | Vulnerable | cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows 11 24h2 | < 10.0.26100.6899 | Vulnerable | cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows 11 25h2 | < 10.0.26200.6899 | Vulnerable | cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows server 2008 | All versions Target HW: x64 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* | 
| 💻OS | microsoft | windows server 2008 | All versions Target HW: x86 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* | 
| 💻OS | microsoft | windows server 2008 | r2 Target HW: x64 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* | 
| 💻OS | microsoft | windows server 2012 | All versions | Vulnerable | cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows server 2012 | r2 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows server 2016 | ≤ 10.0.14393.8519 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows server 2019 | < 10.0.17763.7919 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows server 2022 | < 10.0.20348.4294 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows server 2022 23h2 | < 10.0.25398.1913 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* | 
| 💻OS | microsoft | windows server 2025 | ≤ 10.0.26100.6899 | Vulnerable | cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:* | 
💻
VulnerableOperating System
Version: < 10.0.10240.21161
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*
💻
VulnerableOperating System
Version: < 10.0.10240.21161
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
💻
VulnerableOperating System
Version: < 10.0.14393.8519
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
💻
VulnerableOperating System
Version: < 10.0.14393.8519
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
💻
VulnerableOperating System
Version: < 10.0.17763.7919
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
💻
VulnerableOperating System
Version: < 10.0.17763.7919
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
💻
VulnerableOperating System
Version: < 10.0.19044.6456
CPE:
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: < 10.0.19045.6456
CPE:
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: < 10.0.22621.6060
CPE:
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: ≤ 10.0.22631.6060
CPE:
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: < 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: < 10.0.26200.6899
CPE:
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: All versions
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
💻
VulnerableOperating System
Version: All versions
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
💻
VulnerableOperating System
Version: r2
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
💻
VulnerableOperating System
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: r2
CPE:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: ≤ 10.0.14393.8519
CPE:
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: < 10.0.17763.7919
CPE:
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: < 10.0.20348.4294
CPE:
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: < 10.0.25398.1913
CPE:
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
💻
VulnerableOperating System
Version: ≤ 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
22 products•scroll for more
Metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector:
LOCAL
Complexity:
LOW
Privileges:
LOW
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
7.8 (HIGH)v3.1
Source: [email protected]
EPSS Details
1.5% (Minimal)80.1th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Oct 14, 2025 (18 days ago)
Last Modified
Oct 27, 2025 (5 days ago)
Security Weaknesses1
CWE-284
References3
NVDadvisoryadvisory