CVE-2025-62208

5.5 MEDIUM

📋 TL;DR

Windows License Manager logs sensitive information to local files, allowing authenticated local attackers to read these logs and potentially obtain credentials or other confidential data. This affects Windows systems with License Manager enabled and logging configured.

💻 Affected Systems

Products:
  • Windows License Manager
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Windows License Manager enabled (default on many Windows installations).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could extract credentials, license keys, or other sensitive data from log files, leading to privilege escalation or lateral movement within the network.

🟠

Likely Case

Local users with standard privileges could read sensitive information from log files, potentially exposing credentials or configuration details.

🟢

If Mitigated

With proper access controls and log file permissions, the risk is limited to authorized administrators who already have access to sensitive data.

🌐 Internet-Facing: LOW - This is a local information disclosure vulnerability requiring authenticated access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to gather sensitive information for further attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access to read log files. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62208

Restart Required: Yes

Instructions:

1. Open Windows Update settings
2. Check for updates
3. Install all available security updates
4. Restart the system when prompted

🔧 Temporary Workarounds

Restrict log file permissions

windows

Set strict permissions on License Manager log files to prevent unauthorized reading

icacls "C:\Windows\Logs\LicenseManager\*" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)R"

Disable verbose logging

windows

Configure License Manager to log only essential information

reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform" /v "LogLevel" /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict access controls on log directories to limit read access to administrators only
  • Regularly monitor and audit access to License Manager log files for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if sensitive information appears in License Manager log files at C:\Windows\Logs\LicenseManager\

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows the relevant security update installed and check that log files no longer contain sensitive information

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to License Manager log files
  • Sensitive data patterns in log files (credentials, keys, etc.)

Network Indicators:

  • N/A - This is a local information disclosure vulnerability

SIEM Query:

EventID=4663 AND ObjectName LIKE '%LicenseManager%' AND Accesses LIKE '%ReadData%'

🔗 References

📤 Share & Export