Description
Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges locally.
Published: 2025-12-11
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an improper access control flaw in Microsoft Windows Admin Center that permits an attacker who already has legitimate local access to increase privileges on the host. This issue is identified by CWE-284 and can allow the attacker to perform actions that require higher privileges, potentially compromising system security and data integrity. The vulnerability does not affect remote attackers directly unless they have first gained local credentials.

Affected Systems

Microsoft Windows Admin Center is the only product directly impacted by this vulnerability. No specific version ranges were published in the CNA data, so any deployment of Windows Admin Center that has not applied the latest security updates may be vulnerable.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity, while the EPSS score of less than 1% suggests the exploitation probability is currently low. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires an attacker to be already authenticated to the local Windows system that hosts Windows Admin Center; from that position, the attacker can exploit the access control flaw to elevate privileges. No public exploits are documented, but the presence of a high CVSS score and existing access would make it a suitable target for insider threats or an attacker who has compromised a user account.

Generated by OpenCVE AI on April 20, 2026 at 15:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Windows Admin Center to the latest version available from Microsoft.
  • Review and enforce minimum privilege levels for local accounts used by Windows Admin Center, ensuring only required users have elevated permissions.
  • Audit management server logs for abnormal privilege‑elevation activity and implement alerts for such events.

Generated by OpenCVE AI on April 20, 2026 at 15:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 11 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Description Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges locally.
Title Windows Admin Center Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows Admin Center
Weaknesses CWE-284
CPEs cpe:2.3:a:microsoft:windows_admin_center:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows Admin Center
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows Admin Center
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-16T14:19:08.517Z

Reserved: 2025-11-06T23:40:37.276Z

Link: CVE-2025-64669

cve-icon Vulnrichment

Updated: 2025-12-11T18:26:45.747Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T18:16:24.393

Modified: 2025-12-12T17:30:10.030

Link: CVE-2025-64669

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:45:10Z

Weaknesses