PT-2025-42115 · Microsoft · Windows +1

Published

2025-10-14

·

Updated

2025-11-13

·

CVE-2025-59230

CVSS v3.1
7.8
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Microsoft Windows versions prior to October 14, 2025
Description An improper access control flaw exists in the Windows Remote Access Connection Manager (RASMAN) component. This allows an authenticated local attacker to elevate privileges on the affected system, potentially gaining SYSTEM-level access. The issue stems from insufficient validation of user permissions when interacting with the Remote Access Connection Manager. Active exploitation of this zero-day vulnerability, identified as CVE-2025-59230, has been confirmed, with threat actors targeting enterprise environments. Reports indicate that this is the first instance of a vulnerability in RasMan being exploited as a zero-day. The vulnerability has attracted the attention of threat actors and is being actively exploited in attacks.
Recommendations Update all systems to the version released on or after October 14, 2025. Run a 30-day retroactive security audit.

Fix

LPE

Improper Access Control

Weakness Enumeration

Related Identifiers

BDU:2025-12964
CVE-2025-59230

Affected Products

Windows
Rasman