CVE-2025-26633
Microsoft Windows Management Console (MMC) Imprope - [Actively Exploited]
Description
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
INFO
Published Date :
March 11, 2025, 5:16 p.m.
Last Modified :
April 17, 2025, 6:29 p.m.
Source :
[email protected]
Remotely Exploitable :
No
Impact Score :
5.9
Exploitability Score :
1.0
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Microsoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to execute code over a network.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26633 ; https://nvd.nist.gov/vuln/detail/CVE-2025-26633
Public PoC/Exploit Available at Github
CVE-2025-26633 has a 3 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
Affected Products
The following products are affected by CVE-2025-26633
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-26633
.
URL | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633 | Vendor Advisory |
https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-detection-script | Exploit Third Party Advisory |
https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-mitigation-script | Exploit Third Party Advisory |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
PowerShell HTML
None
Python
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-26633
vulnerability anywhere in the article.

-
BleepingComputer
EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure straddling t ... Read more

-
The Hacker News
Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws
A likely lone wolf actor behind the EncryptHub persona was acknowledged by Microsoft for discovering and reporting two security flaws in Windows last month, painting a picture of a "conflicted" indivi ... Read more

-
tripwire.com
Tripwire Patch Priority Index for March 2025
Tripwire's March 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Microsoft Edge (Chromium-based) and Google Chro ... Read more

-
europa.eu
Cyber Brief 25-04 - March 2025
Cyber Brief (March 2025)April 2, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 575 open source reports for this Cyber Brief1.Policy, cooperation, and law enforcement. Europol, Finnish, German ... Read more

-
The Hacker News
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The a ... Read more

-
SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 13
The Good | Interpol Cracks Down on 300 Cybercriminals Linked to African Cyber Scam Operations 306 suspects have been arrested in Operation Red Card, an international crackdown conducted between Novemb ... Read more

-
SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 13
The Good | Interpol Cracks Down on 300 Cybercriminals Linked to African Cyber Scam Operations 306 suspects have been arrested in Operation Red Card, an international crackdown conducted between Novemb ... Read more

-
Trend Micro
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
Summary Water Gamayun, which exploits the MSC EvilTwin zero-day vulnerability (CVE-2025-26633) to compromise systems and exfiltrate data, uses custom payloads and data exfiltration techniques. Busines ... Read more

-
The Hacker News
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
Windows Security / Vulnerability The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families ... Read more
The following table lists the changes that have been made to the
CVE-2025-26633
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
Apr. 17, 2025
Action Type Old Value New Value Added CWE NVD-CWE-noinfo Added Reference Type CVE: https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-detection-script Types: Exploit, Third Party Advisory Added Reference Type CVE: https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-mitigation-script Types: Exploit, Third Party Advisory -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 16, 2025
Action Type Old Value New Value Added Reference https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-detection-script Added Reference https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-mitigation-script -
Initial Analysis by [email protected]
Mar. 13, 2025
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* *cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* *cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.25398.1486 *cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.26100.3403 *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.14393.7876 *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* versions from (excluding) 10.0.14393.7876 *cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.17763.7009 *cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* versions from (excluding) 10.0.17763.7009 *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* versions from (excluding) 10.0.19044.5608 *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.19044.5608 *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* versions from (excluding) 10.0.19044.5608 *cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.10240.20947 *cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* versions from (excluding) 10.0.10240.20947 *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* versions from (excluding) 10.0.19045.5608 *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.19045.5608 *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* versions from (excluding) 10.0.19045.5608 *cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:* versions from (excluding) 10.0.22621.5039 *cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.22621.5039 *cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* versions from (excluding) 10.0.22631.5039 *cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.22631.5039 *cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* versions from (excluding) 10.0.26100.3403 *cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* versions from (excluding) 10.0.26100.3403 *cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* versions from (excluding) 10.0.20348.3270 Added Reference Type Microsoft Corporation: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633 Types: Vendor Advisory -
CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725
Mar. 12, 2025
Action Type Old Value New Value Added Date Added 2025-03-11 Added Due Date 2025-04-01 Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Added Vulnerability Name Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability -
New CVE Received by [email protected]
Mar. 11, 2025
Action Type Old Value New Value Added Description Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. Added CVSS V3.1 AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Added CWE CWE-707 Added Reference https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-26633
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-26633
weaknesses.