Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
https://www.theregister.com/2025/10/21/cisa_windows_smb_bug/
https://www.databreachtoday.com/cisa-flags-highly-exploitable-windows-smb-flaw-a-29778
https://thehackernews.com/2025/10/five-new-exploited-bugs-land-in-cisas.html
https://www.guidepointsecurity.com/blog/the-birth-and-death-of-loopyticket/
https://www.databreachtoday.com/breach-roundup-critical-rce-flaw-in-roundcube-servers-a-28680
https://www.infosecurity-magazine.com/news/two-microsoft-zero-days-june-patch/
https://thehackernews.com/2025/06/microsoft-patches-67-vulnerabilities.html
https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/
Published: 2025-06-10
Updated: 2025-10-21
Named Vulnerability: LoopyTicketKnown Exploited Vulnerability (KEV)
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.36777
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored