CVE-2026-25187
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.
Analysis
Windows Winlogon's failure to properly validate symbolic links before file access enables local privilege escalation on affected Windows Server and Windows 10/11 systems. An authenticated attacker can exploit this vulnerability to gain elevated system privileges without user interaction. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all systems running affected Winlogon versions and assess user access patterns for suspicious privilege escalation attempts. Within 7 days: Implement enhanced monitoring on privileged account activity, restrict local administrative rights where feasible, and brief security teams on detection signatures. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today