PT-2025-24857 · Microsoft · Windows Smb+1

James Forshaw

+2

·

Published

2025-01-30

·

Updated

2026-03-03

·

CVE-2025-33073

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Microsoft Windows versions prior to the June 2025 security updates
Description A critical improper access control issue exists in the Windows SMB client. This flaw allows an authenticated attacker to elevate privileges to the SYSTEM level on a network. The vulnerability stems from a weakness in Kerberos authentication relay, enabling attackers to coerce authentication and relay Kerberos tickets. Publicly available proof-of-concept exploits exist, and the vulnerability is being actively exploited in the wild. Attackers can exploit this issue by manipulating SMB messages, potentially gaining full control over compromised systems. The vulnerability is particularly severe on systems that do not enforce SMB signing.
Recommendations Apply the June 2025 security updates to all affected systems. Enforce SMB signing on all Windows systems.

Exploit

Fix

RCE

LPE

Improper Access Control

Weakness Enumeration

Related Identifiers

BDU:2025-06677
CVE-2025-33073

Affected Products

Windows
Windows Smb