CVE-2025-26633

HIGH
2025-03-11 [email protected]
7.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 19:52 vuln.today
Added to CISA KEV
Oct 27, 2025 - 17:13 cisa
CISA KEV
PoC Detected
Oct 27, 2025 - 17:13 vuln.today
Public exploit code
CVE Published
Mar 11, 2025 - 17:16 nvd
HIGH 7.0

Description

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

Analysis

A security feature bypass in Microsoft Management Console (MMC) allows attackers to evade security warnings and execute malicious code locally. KEV-listed and tracked as CVE-2025-26633, this vulnerability has been actively exploited by the Water Gamayun threat group (also tracked as EncryptHub) using crafted .msc files to deploy info-stealing malware. Public PoC is available and EPSS is 7.1%.

Technical Context

MMC is a built-in Windows framework for managing system snap-ins (.msc files). The vulnerability allows attackers to craft malicious .msc files that bypass the trust validation and warning mechanisms normally preventing execution of untrusted snap-ins. This is particularly effective because .msc files are commonly used by administrators and are often trusted by security tools. The Water Gamayun/EncryptHub group has been observed chaining this with social engineering.

Affected Products

['Microsoft Windows 10 (all versions)', 'Microsoft Windows 11', 'Microsoft Windows Server 2016/2019/2022']

Remediation

Apply Microsoft security update immediately. Block .msc file attachments at email gateways. Educate users about risks of opening .msc files from untrusted sources. Monitor for suspicious MMC execution patterns. Consider ASR (Attack Surface Reduction) rules to restrict .msc execution.

Priority Score

112
Low Medium High Critical
KEV: +50
EPSS: +7.1
CVSS: +35
POC: +20

Share

CVE-2025-26633 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy