Attack

CISA warns of active exploitation of Windows vulnerability

Take action: One more reason to patch your Windows computers to latest patch. Or just wait to be hacked. Your call.


Learn More

CISA is reporting active exploitation of a Microsoft Windows vulnerability that enables attackers to escalate their privileges on compromised systems, potentially leading to complete system takeover and network-wide compromise. 

The vulnerability is tracked as CVE-2025-59230 (CVSS score 7.8),  Improper Access Control vulnerability in Windows Remote Access Connection Manager allowing local privilege escalation. A design flaw allows authenticated attackers who already possess limited access to a system to exploit the vulnerability and elevate their privileges to higher permission levels, including potentially achieving administrative or SYSTEM-level access.

Threat actors first gain initial access to target systems through other means including phishing campaigns, exploitation of internet-facing vulnerabilities, stolen credentials, or supply chain compromises. Once inside the network with limited user privileges, attackers then exploit privilege escalation vulnerabilities like CVE-2025-59230 to break out of restricted user contexts and gain elevated permissions.

Microsoft has released security updates addressing CVE-2025-59230 as part of the October 2025 patch cycle. Organizations should apply these patches immediately. 

CISA warns of active exploitation of Windows vulnerability