CVE-2025-59230

📊 7.8 HIGH1.5%🎯 0 exploits🏛️ KEV Listed
📅 Published Oct 14, 2025
📋 Status: Analyzed

Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

🎯 Affected Products & Systems

22 product configurations affected

Filter by type:
💻
Operating System
Vulnerable
Version: < 10.0.10240.21161
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: < 10.0.10240.21161
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: < 10.0.14393.8519
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: < 10.0.14393.8519
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: < 10.0.19044.6456
CPE:
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.19045.6456
CPE:
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.22621.6060
CPE:
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.22631.6060
CPE:
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.26200.6899
CPE:
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: All versions
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: All versions
Target HW: x86
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
💻
Operating System
Vulnerable
Version: r2
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
💻
Operating System
Vulnerable
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: r2
CPE:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.14393.8519
CPE:
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.17763.7919
CPE:
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 10.0.20348.4294
CPE:
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
💻
Vulnerable
Version: < 10.0.25398.1913
CPE:
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: ≤ 10.0.26100.6899
CPE:
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
22 productsscroll for more
Metrics
7.8 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector:
LOCAL
Complexity:
LOW
Privileges:
LOW
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
7.8 (HIGH)v3.1
EPSS Details
1.5% (Minimal)80.1th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Oct 14, 2025 (18 days ago)
Last Modified
Oct 27, 2025 (5 days ago)
Security Weaknesses1
References3