privilege escalation

  1. Patch Alert: CVE-2025-59230 RasMan Local Privilege Escalation in Windows

    Microsoft’s October security roll-up closed a dangerous local privilege‑escalation hole in the Remote Access Connection Manager (RasMan) — tracked as CVE‑2025‑59230 — after Microsoft and its threat teams observed in‑the‑wild exploitation; the flaw is an improper access control condition that...
  2. CVE-2025-59194 Windows Kernel Local Privilege Escalation Patch Oct 2025

    Microsoft confirmed a Windows kernel elevation‑of‑privilege vulnerability tracked as CVE‑2025‑59194, describing it as a use of uninitialized resource in kernel code that an authorized local attacker can exploit to gain elevated privileges; Microsoft published the advisory and security update...
  3. CVE-2025-58734 Inbox COM memory flaw patched by Microsoft

    Microsoft has confirmed and patched CVE-2025-58734 — an Inbox COM Objects (Global Memory) vulnerability that can be leveraged for local remote code execution and elevation of privilege in specific hosting contexts, and administrators must treat it as a high-priority fix for exposed and...
  4. CVE-2025-59191 Local Privilege Escalation in Windows CDPSvc — Patch Now

    A heap-based buffer overflow in the Windows Connected Devices Platform Service (Cdpsvc) — tracked as CVE-2025-59191 — was published on October 14, 2025 and classified by vendors as an elevation-of-privilege (EoP) vulnerability that allows an authorized local attacker with low privileges to gain...
  5. CVE-2025-59189 Use-After-Free in Microsoft BFS: Local Privilege Escalation

    Microsoft has published an advisory for CVE-2025-59189, a high‑severity local elevation‑of‑privilege (EoP) bug in the Microsoft Brokering File System (BFS) that Microsoft and multiple independent trackers classify as a use‑after‑free memory corruption enabling a local attacker to escalate to...
  6. CVE-2025-59187 Windows Kernel EoP: Patch Now to Stop Local Privilege Escalation

    Microsoft’s October security rollup includes a newly cataloged Windows Kernel elevation‑of‑privilege tracked as CVE‑2025‑59187, a confirmed local flaw that Microsoft classifies as improper input validation and that carries a CVSS v3.1 base score of 7.8 (High) — administrators should treat this...
  7. CVE-2025-58736 Inbox COM Global Memory Patch Now to Prevent Local Privilege Escalation

    Microsoft has assigned CVE-2025-58736 to a class of vulnerabilities in Inbox COM Objects (Global Memory) that were patched in the October 2025 security updates; the issue is part of a broader family of COM/COM+ defects (race conditions, use‑after‑free and related memory‑safety faults) that can...
  8. CVE-2025-58726: Windows SMB Server Privilege Escalation and Mitigation

    Microsoft assigned CVE-2025-58726 to an improper access control flaw in the Windows SMB Server that can allow an authorized attacker to elevate privileges over a network, and the entry is indexed with a CVSS v3.1 base score of 7.5 (High)—an advisory administrators must treat as a priority for...
  9. CVE-2025-58714: Local Privilege Escalation in Windows AFD WinSock Driver

    Microsoft’s security channels added CVE-2025-58714 to the record this week: an elevation‑of‑privilege weakness in the Windows Ancillary Function Driver for WinSock (the afd.sys stack) that — if left unpatched on an affected host — lets a locally authorized attacker raise their process context to...
  10. CVE-2025-58714: Local Privilege Escalation in WinSock AFD Patch Now

    Microsoft has assigned CVE-2025-58714 to an elevation-of-privilege flaw in the Windows Ancillary Function Driver for WinSock that allows an authorized local user to gain higher privileges, and Microsoft issued fixes on October 14, 2025 — administrators should treat this as a high-priority patch...
  11. Mitigating Windows CDPSvc UAF Elevation: Patch CVE-2025-58727 Now

    A use-after-free memory‑corruption flaw in the Windows Connected Devices Platform Service (CDPSvc) has been publicly recorded as an elevation‑of‑privilege vulnerability that can allow a local, authorized attacker to gain SYSTEM privileges on affected hosts — administrators must treat CDPSvc...
  12. CVE-2025-58725 Inbox COM EoP: Patch Windows with KB mapping

    Microsoft has recorded CVE-2025-58725 as an elevation-of-privilege vulnerability in the Windows COM+ Event System (Inbox COM) / COM-based handler family that can allow a locally authorized attacker to escalate privileges on affected Windows hosts; administrators should treat this as a...
  13. Azure Arc Connected Machine EoP: Local Privilege Escalation on Arc Agents

    A high‑impact elevation‑of‑privilege flaw has been disclosed in the Azure Connected Machine (Azure Arc) agent that can let an authenticated local user — or an attacker with low‑privileged local execution — escalate to SYSTEM/root on Arc‑enabled servers, and potentially abuse machine identities...
  14. CVE-2025-55696: Windows Kernel TOCTOU Token Race Privilege Escalation

    A newly recorded Windows kernel vulnerability, tracked as CVE-2025-55696, is a time‑of‑check/time‑of‑use (TOCTOU) race in the NtQueryInformationToken implementation (ntifs.h) that can allow a local attacker to elevate privileges to SYSTEM when exploited; Microsoft has published the entry in its...
  15. Microsoft Patch Tuesday Fixes CVE-2025-55698 DirectX Kernel DoS

    Microsoft’s October security updates close a path to system instability in the DirectX graphics stack: CVE-2025-55698 is a null pointer dereference in the DirectX Graphics Kernel that can be triggered remotely by an authenticated, low-privileged attacker to cause a denial of service (DoS) and...
  16. CVE-2025-55697: Azure Local Heap Overflow Elevates Privilege

    CVE-2025-55697 is a newly catalogued heap‑based buffer overflow in an Azure local component that allows an authorized local user to elevate privileges on an affected host; Microsoft assigned a high severity rating (CVSS 3.1 base score 7.8) and published vendor guidance that administrators should...
  17. CVE-2025-50152: Windows Kernel Out-of-Bounds Read and Local Privilege Escalation

    Microsoft’s advisory for CVE-2025-50152 documents an out‑of‑bounds read in the Windows kernel that may allow an authorized local attacker to elevate privileges to SYSTEM; independent vulnerability trackers list the flaw with a CVSS v3.1 base score of 7.8 (High) and, until vendor KB mappings are...
  18. CVE-2025-58728 Windows Bluetooth Use After Free Privilege Escalation Patch

    A use-after-free flaw in the Windows Bluetooth Service has been cataloged as CVE-2025-58728 and classified as a local elevation-of-privilege vulnerability that Microsoft patched as part of the October 2025 update cycle; the weakness can allow an authenticated, local user process to corrupt...
  19. Windows PrintWorkflowUserSvc Use-After-Free: Privilege Escalation CVE-2025-55684

    Microsoft has confirmed a high‑impact elevation‑of‑privilege vulnerability in the PrintWorkflowUserSvc component of Windows, tracked as CVE‑2025‑55684, that allows a local, low‑privileged user to potentially escalate to SYSTEM under certain conditions — Microsoft classifies the bug as a...
  20. CVE-2025-55688 Local Privilege Escalation in Windows PrintWorkflowUserSvc

    Microsoft has recorded CVE-2025-55688 as a use-after-free vulnerability in the Windows PrintWorkflowUserSvc that can allow a low‑privileged, authenticated local user to escalate to SYSTEM — Microsoft has published advisories and security updates addressing the issue, and multiple independent...