Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230
https://securityaffairs.com/183479/security/u-s-cisa-adds-skysea-client-view-rapid7-velociraptor-microsoft-windows-and-igel-os-flaws-to-its-known-exploited-vulnerabilities-catalog.html
https://www.securityweek.com/microsoft-patches-173-vulnerabilities-including-exploited-windows-flaws/
https://www.infosecurity-magazine.com/news/last-windows-10-patch-tuesday-six/
https://www.helpnetsecurity.com/2025/10/15/microsoft-patch-tuesday-zero-days-cve-2025-24990-cve-2025-59230-cve-2025-47827/
https://thehackernews.com/2025/10/two-new-windows-zero-days-exploited-in.html
https://www.cisa.gov/news-events/alerts/2025/10/14/cisa-adds-five-known-exploited-vulnerabilities-catalog
Source: Mitre, NVD
Published: 2025-10-14
Updated: 2025-10-15
Known Exploited Vulnerability (KEV)
Base Score: 6.8
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.05808