CVE-2025-26633

7.0 HIGH CISA KEV

📋 TL;DR

CVE-2025-26633 is a security feature bypass vulnerability in Microsoft Management Console (MMC) that allows a local attacker to circumvent security controls through improper input neutralization. This affects systems running vulnerable versions of Windows where MMC is present. Attackers must have local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Microsoft Management Console
  • Windows operating systems with MMC
Versions: Specific Windows versions as listed in Microsoft Security Update Guide
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. MMC is included by default in affected Windows versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could bypass security features to gain elevated privileges, modify system configurations, or disable security controls, potentially leading to full system compromise.

🟠

Likely Case

Local attackers bypass specific security restrictions within MMC to perform unauthorized administrative actions or access restricted functionality.

🟢

If Mitigated

With proper access controls and patching, impact is limited to failed exploitation attempts with no privilege escalation.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Internal attackers with local access can exploit this to bypass security features and potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of the specific security feature bypass technique. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633

Restart Required: No

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Verify the update is installed via Windows Update or WSUS. 3. No system restart is typically required for MMC updates.

🔧 Temporary Workarounds

Restrict local access to MMC

all

Limit which users can access Microsoft Management Console through Group Policy or local security settings

gpedit.msc -> User Configuration -> Administrative Templates -> Windows Components -> Microsoft Management Console

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit who can run MMC
  • Monitor for unusual MMC activity and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for the specific KB patch mentioned in Microsoft's advisory

Check Version:

wmic qfe list | findstr KB[number] or Get-Hotfix -Id KB[number] in PowerShell

Verify Fix Applied:

Verify the security update is installed via 'Settings > Update & Security > View update history'

📡 Detection & Monitoring

Log Indicators:

  • Unusual MMC process execution by non-admin users
  • Security event logs showing privilege escalation attempts

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4688 AND ProcessName LIKE '%mmc.exe%' AND SubjectUserName NOT IN (admin_users_list)

🔗 References

📤 Share & Export