CVE-2025-47993

7.8 HIGH

📋 TL;DR

This vulnerability in Microsoft PC Manager allows authenticated attackers to bypass intended access controls and gain elevated privileges on the local system. It affects users running vulnerable versions of Microsoft PC Manager on Windows systems. Attackers must already have some level of access to the system to exploit this flaw.

💻 Affected Systems

Products:
  • Microsoft PC Manager
Versions: Versions prior to the patched release
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Microsoft PC Manager to be installed and running. The vulnerability is in the access control mechanism of the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with initial access could gain SYSTEM/administrator privileges, install persistent malware, disable security controls, access sensitive data, and pivot to other systems.

🟠

Likely Case

Malicious insiders or attackers who have gained initial foothold could elevate privileges to install additional tools, maintain persistence, or bypass security monitoring.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the compromised user account scope.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the system. The attacker needs to be able to execute code in the context of a standard user account.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft PC Manager update through Microsoft Store or Windows Update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47993

Restart Required: Yes

Instructions:

1. Open Microsoft Store 2. Click Library 3. Click Get updates 4. Install Microsoft PC Manager update 5. Restart the system

🔧 Temporary Workarounds

Uninstall Microsoft PC Manager

windows

Remove the vulnerable application entirely

winget uninstall Microsoft.PCManager
Or use Settings > Apps > Microsoft PC Manager > Uninstall

Restrict application execution

windows

Use AppLocker or Windows Defender Application Control to block Microsoft PC Manager execution

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users run with minimal necessary permissions
  • Monitor for privilege escalation attempts using Windows Event Logs and security tools

🔍 How to Verify

Check if Vulnerable:

Check Microsoft PC Manager version in Settings > Apps > Microsoft PC Manager > Advanced options

Check Version:

Get-AppxPackage -Name Microsoft.PCManager | Select Version

Verify Fix Applied:

Verify Microsoft PC Manager has updated to latest version and check Windows Update history for applied patches

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 with Microsoft PC Manager process spawning elevated processes
  • Unexpected privilege escalation events
  • Microsoft PC Manager accessing privileged resources

Network Indicators:

  • None - this is a local privilege escalation

SIEM Query:

EventID=4688 AND ProcessName="*PCManager*" AND NewProcessName IN ("cmd.exe", "powershell.exe", "net.exe", "reg.exe")

🔗 References

📤 Share & Export