CVE-2025-59230
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
| Vendor | microsoft |
| Product | windows 10 version 1507 |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Oct 14, 2025 |
| Last Updated | Feb 26, 2026 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for microsoft windows 10 version 1507
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2025-59230.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Microsoft / Windows 10 Version 1507
10.0.10240.0 < 10.0.10240.21161
Microsoft / Windows 10 Version 1607
10.0.14393.0 < 10.0.14393.8519
Microsoft / Windows 10 Version 1809
10.0.17763.0 < 10.0.17763.7919
Microsoft / Windows 10 Version 21H2
10.0.19044.0 < 10.0.19044.6456
Microsoft / Windows 10 Version 22H2
10.0.19045.0 < 10.0.19045.6456
Microsoft / Windows 11 version 22H2
10.0.22621.0 < 10.0.22621.6060
Microsoft / Windows 11 version 22H3
10.0.22631.0 < 10.0.22631.6060
Microsoft / Windows 11 Version 23H2
10.0.22631.0 < 10.0.22631.6060
Microsoft / Windows 11 Version 24H2
10.0.26100.0 < 10.0.26100.6899
Microsoft / Windows 11 Version 25H2
10.0.26200.0 < 10.0.26200.6899
Microsoft / Windows Server 2008 R2 Service Pack 1
6.1.7601.0 < 6.1.7601.27974
Microsoft / Windows Server 2008 R2 Service Pack 1 (Server Core installation)
6.1.7601.0 < 6.1.7601.27974
Microsoft / Windows Server 2008 Service Pack 2
6.0.6003.0 < 6.0.6003.23571
Microsoft / Windows Server 2008 Service Pack 2 (Server Core installation)
6.0.6003.0 < 6.0.6003.23571
Microsoft / Windows Server 2012
6.2.9200.0 < 6.2.9200.25722
Microsoft / Windows Server 2012 (Server Core installation)
6.2.9200.0 < 6.2.9200.25722
Microsoft / Windows Server 2012 R2
6.3.9600.0 < 6.3.9600.22824
Microsoft / Windows Server 2012 R2 (Server Core installation)
6.3.9600.0 < 6.3.9600.22824
Microsoft / Windows Server 2016
10.0.14393.0 < 10.0.14393.8519
Microsoft / Windows Server 2016 (Server Core installation)
10.0.14393.0 < 10.0.14393.8519
Microsoft / Windows Server 2019
10.0.17763.0 < 10.0.17763.7919
Microsoft / Windows Server 2019 (Server Core installation)
10.0.17763.0 < 10.0.17763.7919
Microsoft / Windows Server 2022
10.0.20348.0 < 10.0.20348.4294
Microsoft / Windows Server 2022, 23H2 Edition (Server Core installation)
10.0.25398.0 < 10.0.25398.1913
Microsoft / Windows Server 2025
10.0.26100.0 < 10.0.26100.6899
Microsoft / Windows Server 2025 (Server Core installation)
10.0.26100.0 < 10.0.26100.6899
References
msrc.microsoft.com: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59230 vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2025-59230-detection-script-elevation-of-privilege-vulnerability-affecting-windows-rasman vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2025-59230-mitigation-script-elevation-of-privilege-vulnerability-affecting-windows-rasman