Dec 2025: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62472 Published on December 9, 2025
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Use of uninitialized resource in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
Weakness Types
Use of Uninitialized Resource
The software uses or accesses a resource that has not been initialized. When a resource has not been properly initialized, the software may behave unexpectedly. This may lead to a crash or invalid memory access, but the consequences vary depending on the type of resource and how it is used within the software.
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-62472 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2025-62472
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1607:- Version 10.0.14393.0 and below 10.0.14393.8688 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8146 is affected.
- Version 10.0.19044.0 and below 10.0.19044.6691 is affected.
- Version 10.0.19045.0 and below 10.0.19045.6691 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6345 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6345 is affected.
- Version 10.0.26100.0 and below 10.0.26100.7462 is affected.
- Version 10.0.26200.0 and below 10.0.26200.7462 is affected.
- Version 6.1.7601.0 and below 6.1.7601.28064 is affected.
- Version 6.1.7601.0 and below 6.1.7601.28064 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23666 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23666 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25815 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25815 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22920 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22920 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8688 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8688 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8146 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8146 is affected.
- Version 10.0.20348.0 and below 10.0.20348.4529 is affected.
- Version 10.0.25398.0 and below 10.0.25398.2025 is affected.
- Version 10.0.26100.0 and below 10.0.26100.7462 is affected.
- Version 10.0.26100.0 and below 10.0.26100.7462 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.