CVE-2025-60718

7.8 HIGH

📋 TL;DR

This vulnerability in Windows Administrator Protection allows an authenticated attacker to exploit an untrusted search path to elevate privileges locally. It affects Windows systems where an attacker already has some level of access but wants to gain higher administrative privileges. This is a local privilege escalation vulnerability requiring initial access to the system.

💻 Affected Systems

Products:
  • Windows Administrator Protection
Versions: Specific Windows versions as detailed in Microsoft advisory
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows Administrator Protection feature to be enabled/available. Affects systems where this component is present and vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with standard user access gains full SYSTEM/administrator privileges, enabling complete system compromise, credential theft, persistence establishment, and lateral movement.

🟠

Likely Case

Malicious insider or compromised user account escalates to administrator privileges to install malware, steal sensitive data, or bypass security controls.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with minimal data exposure and quick detection.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access, not directly exploitable over the network.
🏢 Internal Only: HIGH - Significant risk for internal networks where attackers can gain initial foothold through phishing, compromised credentials, or other vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of the vulnerable search path. CWE-426 indicates untrusted search path vulnerability typically involving DLL hijacking or similar techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60718

Restart Required: Yes

Instructions:

1. Open Windows Update Settings
2. Click 'Check for updates'
3. Install all available security updates
4. Restart system when prompted

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Configure system to use safe DLL search mode to prevent loading from current directory

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

Enable Attack Surface Reduction

windows

Use Windows Defender Exploit Guard to block untrusted DLL loading

Set-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EFC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Enabled

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit who has local login access
  • Enable enhanced auditing and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Windows version and installed updates against Microsoft advisory. Use: wmic os get caption,version,buildnumber

Check Version:

wmic os get caption,version,buildnumber

Verify Fix Applied:

Verify the specific KB update from Microsoft advisory is installed: wmic qfe list | findstr KB

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688: Process creation with suspicious parent-child relationships
  • Event ID 4672: Special privileges assigned to new logon
  • Unexpected DLL loading from user-writable directories

Network Indicators:

  • Not applicable - local privilege escalation

SIEM Query:

EventID=4688 AND (ParentImage LIKE '%cmd.exe%' OR ParentImage LIKE '%powershell.exe%') AND (NewProcessName LIKE '%system32%' OR CommandLine CONTAINS 'reg' OR CommandLine CONTAINS 'schtasks')

🔗 References

📤 Share & Export