CVE-2025-47962

| EUVD-2025-17765 HIGH
2025-06-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17765
CVE Published
Jun 10, 2025 - 17:24 nvd
HIGH 7.8

Description

Improper access control in Windows SDK allows an authorized attacker to elevate privileges locally.

Analysis

CVE-2025-47962 is an improper access control vulnerability in Windows SDK that allows an authenticated local attacker to escalate privileges without user interaction. The vulnerability affects Windows SDK components and presents a high risk due to its CVSS score of 7.8 (High severity) with high impact on confidentiality, integrity, and availability. While no active exploitation in the wild (KEV status) or public POC has been confirmed at this time, the low attack complexity and requirement for only local user privileges make this a significant priority for Windows environments.

Technical Context

This vulnerability stems from CWE-284 (Improper Access Control), a fundamental authorization bypass weakness where the Windows SDK fails to properly validate or enforce access control restrictions for local users. The flaw likely exists in Windows SDK components responsible for privilege-sensitive operations or system resource access. The attack vector is local (AV:L) with low complexity (AC:L), indicating the vulnerability can be exploited through standard local system access without requiring complex manipulation. The root cause appears to be insufficient authorization checks that allow authenticated users with standard privileges to access or modify protected resources or operations intended for elevated privilege levels, bypassing the principle of least privilege.

Affected Products

Windows SDK (all versions containing the vulnerable access control implementation) - specific version ranges not provided in the source data. The vulnerability likely affects Windows SDK components across multiple Windows versions (Windows 10, Windows 11, Windows Server 2019, Windows Server 2022, etc.). Organizations should consult Microsoft's official security advisory for definitive affected product version lists and should monitor Windows SDK releases for cumulative and security updates addressing this vulnerability. CPE data should reflect patterns such as cpe:2.3:a:microsoft:windows_sdk:*:*:*:*:*:*:*:* with version constraints to be determined by vendor patch documentation.

Remediation

1) Apply Windows SDK security updates when released by Microsoft - check Microsoft Security Update Guide and Windows SDK release notes for CVE-2025-47962. 2) Prioritize patching for systems where local user account compromise is a realistic threat (multi-user systems, shared dev environments). 3) Implement compensating controls: restrict local user account creation and access, enforce strict user account access controls, implement application whitelisting for SDK tools, and monitor for unauthorized privilege escalation attempts. 4) Review and audit local user permissions on systems running Windows SDK, removing unnecessary local user accounts. 5) Monitor Windows Security event logs for privilege escalation or access control violations. 6) In high-risk environments, isolate Windows SDK usage to dedicated, hardened systems with minimal local user accounts until patches are validated and deployed.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +39
POC: 0

Share

CVE-2025-47962 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy