Oct 2025: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-59230 Published on October 14, 2025
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
Known Exploited Vulnerability
This Microsoft Windows Improper Access Control Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.
The following remediation steps are recommended / required by November 4, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2025-59230 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2025-59230
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-59230 are published in these products:
Affected Versions
Microsoft Windows 10 Version 1507:- Version 10.0.10240.0 and below 10.0.10240.21161 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8519 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7919 is affected.
- Version 10.0.19044.0 and below 10.0.19044.6456 is affected.
- Version 10.0.19045.0 and below 10.0.19045.6456 is affected.
- Version 10.0.22621.0 and below 10.0.22621.6060 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6060 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6060 is affected.
- Version 10.0.26100.0 and below 10.0.26100.6899 is affected.
- Version 10.0.26200.0 and below 10.0.26200.6899 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27974 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27974 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23571 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23571 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25722 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25722 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22824 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22824 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8519 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8519 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7919 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7919 is affected.
- Version 10.0.20348.0 and below 10.0.20348.4294 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1913 is affected.
- Version 10.0.26100.0 and below 10.0.26100.6899 is affected.
- Version 10.0.26100.0 and below 10.0.26100.6899 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.