Security Feature Bypass in Microsoft Management Console
CVE-2025-26633

7HIGH

Key Information:

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 3,560πŸ’° RansomwareπŸ‘Ύ Exploit ExistsπŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2025-26633?

CVE-2025-26633 is a vulnerability identified in the Microsoft Management Console (MMC), which is a key framework used for managing various components of the Windows operating system and applications. This vulnerability allows unauthorized individuals to bypass critical security features locally. As a result, organizations leveraging MMC for system administration might face severe security risks, including potential unauthorized access to sensitive data and management functionalities within their systems.

Technical Details

The nature of CVE-2025-26633 involves improper neutralization, which enables attackers to exploit weaknesses in the way that security features are enforced within the Microsoft Management Console. This flaw creates avenues for attackers to gain elevated access without proper authorization, circumventing established security protocols. Such technical intricacies could allow for further exploitation of the underlying system if left unaddressed.

Potential Impact of CVE-2025-26633

  1. Unauthorized Access: The primary risk is that attackers can gain unauthorized control over the MMC, allowing them to manipulate system settings and resources without detection.

  2. Data Breaches: By bypassing security measures, attackers could access sensitive information, leading to potential data leaks and breaches that may have regulatory and legal implications.

  3. System Compromise: Exploitation of this vulnerability could lead to broader system compromises, enabling attackers to deploy malware, conduct further attacks, or disrupt normal operations, thereby affecting business continuity.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20947

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7876

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.7009

News Articles

Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

Water Gamayun exploited CVE-2025-26633 to deploy SilentPrism, DarkWisp, and stealers with persistence.

6 hours ago

A Deep Dive into Water Gamayun's Arsenal and Infrastructure

Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.

4 days ago

EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware

EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.

5 days ago

References

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • πŸ’°

    Used in Ransomware

  • πŸ“°

    First article discovered by Trend Micro

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ¦…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.