CVE-2025-26633

HIGH KEV RANSOMWARE

Microsoft Management Console - Auth Bypass

Title source: llm

Description

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

Exploits (3)

exploitdb WORKING POC
by Mohammed Idrees Banyamer · pythonlocalwindows
https://www.exploit-db.com/exploits/52498
nomisec WORKING POC 3 stars
by mbanyamer · poc
https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
nomisec WORKING POC 2 stars
by sandsoncosta · local
https://github.com/sandsoncosta/CVE-2025-26633

Scores

CVSS v3 7.0
EPSS 0.3258
EPSS Percentile 96.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CISA KEV 2025-03-11
VulnCheck KEV 2025-03-11
ENISA EUVD EUVD-2025-6311
Ransomware Use Confirmed
CWE
CWE-707
Status published
Products (17)
microsoft/windows_10_1507 < 10.0.10240.20947 (2 CPE variants)
microsoft/windows_10_1607 < 10.0.14393.7876 (2 CPE variants)
microsoft/windows_10_1809 < 10.0.17763.7009 (2 CPE variants)
microsoft/windows_10_21h2 < 10.0.19044.5608 (3 CPE variants)
microsoft/windows_10_22h2 < 10.0.19045.5608 (3 CPE variants)
microsoft/windows_11_22h2 < 10.0.22621.5039 (2 CPE variants)
microsoft/windows_11_23h2 < 10.0.22631.5039 (2 CPE variants)
microsoft/windows_11_24h2 < 10.0.26100.3403 (2 CPE variants)
microsoft/windows_server_2008 (2 CPE variants)
microsoft/windows_server_2008 r2 sp1
... and 7 more
Published Mar 11, 2025
KEV Added Mar 11, 2025
Tracked Since Feb 18, 2026