PT-2025-50669 · Microsoft · Windows Admin Center
Published
2025-12-09
·
Updated
2026-01-24
·
CVE-2025-64669
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Windows Admin Center versions prior to 2.4.2.1
Windows Admin Center versions prior to 2411
Description
An improper access control issue exists in Windows Admin Center. This allows an authorized attacker to elevate privileges locally, potentially gaining SYSTEM-level access. The issue stems from insecure directory permissions, specifically a writable C:ProgramDataWindowsAdminCenter directory used by high-privilege services. Two primary exploitation vectors were identified: abuse of the extension uninstall mechanism through signed PowerShell script substitution in the C:ProgramDataWindowsAdminCenterExtensionsuninstall directory, and a Time-of-Check-to-Time-of-Use (TOCTOU) attack involving DLL hijacking in the C:ProgramDataWindowsAdminCenterUpdater directory via Windows Management Instrumentation (WMI) event monitoring of the WindowsAdminCenterUpdater.exe process, specifically targeting the
/api/update endpoint.Recommendations
Update Windows Admin Center to a version greater than 2.4.2.1.
Update Windows Admin Center to version 2411 or later.
As an additional measure, or if updating is not possible, modify the Access Control List (ACL) on C:ProgramDataWindowsAdminCenter to deny write access for regular users.
Restrict access to the Extensions and Updater subfolders to SYSTEM and administrators only.
As a temporary workaround, consider disabling the extension uninstall functionality until a patch is available.
As a temporary workaround, restrict access to the
/api/update endpoint until a patch is available.Fix
LPE
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-15997
CVE-2025-64669
Affected Products
Windows Admin Center
References · 27
- https://nvd.nist.gov/vuln/detail/CVE-2025-64669 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64669 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-15997 · Security Note
- https://reddit.com/r/CVEWatch/comments/1pqii1h/top_10_trending_cves_19122025 · Reddit Post
- https://twitter.com/JarralA1/status/2001599545797439746 · Twitter Post
- https://t.me/RNetsec/22322 · Telegram Post
- https://twitter.com/nxtgen579255/status/2001459850510016576 · Twitter Post
- https://t.me/defcon_news/133142 · Telegram Post
- https://twitter.com/CVEnew/status/1999876883027005453 · Twitter Post
- https://t.me/proxy_bar/2966 · Telegram Post
- https://twitter.com/chenhshiri/status/2000925329746006020 · Twitter Post
- https://twitter.com/piedpiper1616/status/2001121047593279948 · Twitter Post
- https://twitter.com/ksg93rd/status/2001633760538718714 · Twitter Post
- https://t.me/purp_sec/1340 · Telegram Post
- https://cymulate.com/blog/cve-2025-64669-windows-admin-center · Reddit Post