CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Tags
Description
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
Analysis
Windows SMB contains an improper access control vulnerability (CVE-2025-33073, CVSS 8.8) enabling authenticated attackers to escalate privileges over the network. KEV-listed with EPSS 57.6% and public PoC, this vulnerability in the core Windows file sharing protocol affects every Windows system on the network, enabling lateral movement from any compromised domain account to SYSTEM-level access on SMB-accessible systems.
Technical Context
SMB (Server Message Block) is the primary file and print sharing protocol in Windows networks. The access control flaw allows an authenticated user (any domain account) to escalate privileges on remote systems through the SMB protocol. Because SMB is enabled by default on all Windows systems and is the foundation of Windows domain file sharing, this vulnerability provides a powerful lateral movement technique — any compromised domain account can escalate to SYSTEM on any reachable Windows system.
Affected Products
['Microsoft Windows 10', 'Microsoft Windows 11', 'Microsoft Windows Server (all supported versions)']
Remediation
Apply Microsoft security update immediately across all Windows systems. This is a network-worm-capable vulnerability — patch everything. Monitor for unusual SMB authentication patterns. Consider SMB signing and encryption enforcement. Segment networks to limit SMB exposure.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17737