CVE-2025-48799
📋 TL;DR
This CVE describes a local privilege escalation vulnerability in Windows Update Service where improper link resolution allows an authorized attacker to elevate privileges. Attackers can exploit symbolic link manipulation to gain SYSTEM-level access. This affects Windows systems with the vulnerable Windows Update Service component.
💻 Affected Systems
- Windows Update Service
📦 What is this software?
Windows 10 1607 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains SYSTEM privileges, enabling complete system compromise, persistence installation, credential theft, and lateral movement across the network.
Likely Case
Local authenticated attacker elevates from standard user to SYSTEM privileges to install malware, modify system configurations, or bypass security controls.
If Mitigated
With proper patch management and least privilege principles, impact is limited to isolated systems with no lateral movement capability.
🎯 Exploit Status
Exploit requires local authenticated access. Public detection and mitigation scripts are available from security researchers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft Security Update Guide for specific KB numbers
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48799
Restart Required: Yes
Instructions:
1. Apply latest Windows security updates from Microsoft. 2. Install the specific KB patch for CVE-2025-48799. 3. Restart the system as required.
🔧 Temporary Workarounds
Disable Windows Update Service
windowsTemporarily disable Windows Update Service to prevent exploitation
sc config wuauserv start= disabled
net stop wuauserv
Apply symbolic link restrictions
windowsConfigure Windows symbolic link policies to restrict creation
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v "ProtectionMode" /t REG_DWORD /d 1 /f
🧯 If You Can't Patch
- Implement strict least privilege access controls to limit who has local access to systems
- Monitor for suspicious Windows Update Service activity and symbolic link creation events
🔍 How to Verify
Check if Vulnerable:
Check Windows Update Service version and compare against patched versions in Microsoft advisory
Check Version:
wmic qfe list | findstr KB
Verify Fix Applied:
Verify Windows Update KB patch is installed and system has been restarted
📡 Detection & Monitoring
Log Indicators:
- Windows Update Service unexpected restarts
- Symbolic link creation events in Windows security logs
- Process creation with SYSTEM privileges from non-SYSTEM accounts
Network Indicators:
- Unusual outbound connections from Windows Update Service
SIEM Query:
EventID=4688 AND NewProcessName="*wuauserv*" AND SubjectUserName!="SYSTEM"
🔗 References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48799
- https://www.vicarius.io/vsociety/posts/cve-2025-48799-detection-script-elevation-of-privilege-vulnerability-in-windows-update-service
- https://www.vicarius.io/vsociety/posts/cve-2025-48799-mitigation-script-elevation-of-privilege-vulnerability-in-windows-update-service