CVE-2025-21293

HIGH
2025-01-14 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 28, 2026 - 18:03 vuln.today
Patch Released
Mar 28, 2026 - 18:03 nvd
Patch available
CVE Published
Jan 14, 2025 - 18:15 nvd
HIGH 8.8

Description

Active Directory Domain Services Elevation of Privilege Vulnerability

Analysis

Active Directory Domain Services contains an elevation of privilege vulnerability that allows authenticated domain users to escalate to domain administrator. The vulnerability enables lateral movement and complete domain compromise from any authenticated position within the Active Directory environment.

Technical Context

This vulnerability in Active Directory Domain Services allows a regular authenticated domain user to elevate their privileges to domain administrator. The specific mechanism involves improper access control in AD DS that can be exploited through crafted LDAP or Kerberos operations. Successful exploitation grants the attacker full control over the Active Directory domain.

Affected Products

['Windows Server 2016/2019/2022/2025', 'Active Directory Domain Services']

Remediation

Apply the January 2025 Microsoft security update immediately. Implement tiered administration model to limit blast radius of privilege escalation. Monitor AD for unexpected group membership changes, especially to privileged groups. Deploy Microsoft ATA or Defender for Identity to detect anomalous AD operations.

Priority Score

119
Low Medium High Critical
KEV: 0
EPSS: +75.3
CVSS: +44
POC: 0

Share

CVE-2025-21293 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy