Windows Remote Access Connection Manager Vulnerabilities Let Attackers Escalate Privileges

On December 9, 2025, two significant privilege escalation vulnerabilities were unveiled in the Windows Remote Access Connection Manager, identified as CVE-2025-62472 and CVE-2025-62474. These flaws present a serious risk, allowing authorized attackers with minimal privileges to escalate their access to SYSTEM-level permissions on affected systems.

Details of the Vulnerabilities

CVE-2025-62472 is attributed to the mishandling of uninitialized resources within the Remote Access Connection Manager, leading to potential privilege escalation through memory mismanagement. This vulnerability has been assigned a CVSS score of 7.8 and is classified as having Important severity.

In contrast, CVE-2025-62474 arises from inadequate access control mechanisms in the same component, also rated Important with a CVSS score of 7.8. Both vulnerabilities necessitate local access and low user privileges for exploitation, yet once initiated, they require no further user interaction, amplifying their threat in environments where multiple users share systems or where accounts may be compromised.

CVE ID Weakness CVSS Score
CVE-2025-62472 CWE-908 (Uninitialized Resource), CWE-416 (Use After Free) 7.8
CVE-2025-62474 CWE-284 (Improper Access Control) 7.8

Exploiting either vulnerability grants an attacker complete SYSTEM privileges, representing the highest level of access on Windows systems. Notably, Microsoft has reported no public disclosures or active exploitation of these vulnerabilities as of the announcement date.

The exploitability assessment indicates that CVE-2025-62472 is “Exploitation More Likely,” while CVE-2025-62474 is deemed “Exploitation Less Likely.” This suggests that the uninitialized resource vulnerability may be more straightforward to weaponize, although both vulnerabilities remain in the unproven exploit code maturity stage.

Operating System KB Article Build Number
Windows Server 2025 5072033, 5072014 10.0.26100.7462
Windows Server 2022 5071547, 5071413 10.0.20348.4529
Windows Server 2019 5071544 10.0.17763.8146
Windows Server 2016 5071543 10.0.14393.8688
Windows 11 Version 24H2 5072033, 5072014 10.0.26100.7462
Windows 11 Version 23H2 5071417 10.0.22631.6345
Windows 10 Version 22H2 5071546 10.0.19045.6691
Windows 10 Version 1809 5071544 10.0.17763.8146

The vulnerabilities affect a wide range of Windows versions, including Windows Server editions from 2008 to 2025, as well as various Windows 10 and 11 releases. In response, Microsoft has issued security updates across all supported platforms, urging organizations to prioritize patching these vulnerabilities without delay, especially on systems managing sensitive operations or accommodating multiple users.

The prompt availability of official fixes with confirmed remediation levels offers customers essential protection against these privilege escalation threats.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

Winsage
Windows Remote Access Connection Manager Vulnerabilities Let Attackers Escalate Privileges