VulnerabilitiesHIGH

Microsoft MMC MSC EvilTwin - Local Admin Creation Exploit

Featured image for Microsoft MMC MSC EvilTwin - Local Admin Creation Exploit
#CVE-2025-26633#Windows#Microsoft MMC#Local Admin#Water Gamayun APT

Original Reporting

EDExploit-DB

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk β€” action recommended within 24-48 hours

πŸ›‘οΈ
πŸ›‘οΈ VULNERABILITY DETAILSCVE-2025-26633CVSS: 7.8ACTIVELY EXPLOITED
CVE IDCVE-2025-26633
CVSS Score7.8 / 10 (High)
Severity Ratingβ€”
Affected ProductWindows 10, Windows 11, Windows Server 2016-2025
VendorMicrosoft
Vulnerability TypeLocal Privilege Escalation
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredUser
User InteractionRequired
Actively ExploitedYes
Patch AvailableYes
Workaround Availableβ€”
🎯

Basically, a flaw in Windows lets hackers create admin accounts using a fake file.

Quick Summary

A new vulnerability in Microsoft MMC allows attackers to create local admin accounts through malicious files. This affects Windows 10 and 11 users. Immediate patching is crucial to prevent unauthorized access.

The Flaw

A newly discovered vulnerability, identified as CVE-2025-26633, affects Microsoft Management Console (MMC) on Windows systems. This flaw allows attackers to create a local administrator account through a malicious .msc file. The vulnerability has a CVSS score of 7.8, indicating a high severity level.

What's at Risk

The exploit can lead to arbitrary code execution with the privileges of the user opening the malicious file. This means that if an unsuspecting user executes the file, an attacker can gain full administrative access to the system. The vulnerability affects all editions of Windows 10 and 11, as well as Windows Server 2016-2025.

Patch Status

Microsoft has released patches addressing this vulnerability in their March 2025 Patch Tuesday updates. Users are advised to apply updates such as KB5053602 and later to mitigate the risk of exploitation.

Immediate Actions

To protect your systems, follow these steps:

  • Apply the latest Microsoft patches immediately.
  • Monitor for unusual account creations or administrative access on your systems.
  • Educate users about the risks of executing unknown files, especially .msc files.

Exploit Details

The exploit involves creating a malicious .msc file that, when executed, silently adds a local administrator account named "hacker" with a preset password. This method is a post-exploitation technique commonly used in real-world attacks, including those attributed to the Water Gamayun APT group.

Conclusion

The CVE-2025-26633 vulnerability represents a significant threat to unpatched Windows systems. Immediate action is necessary to prevent unauthorized access and potential data breaches. Ensure your systems are updated and educate your users to recognize potential threats.

πŸ” How to Check If You're Affected

  1. 1.Check for the presence of unauthorized local administrator accounts.
  2. 2.Review system logs for unusual activity related to account creation.
  3. 3.Ensure that the latest Microsoft patches are applied to all systems.

🏒 Impacted Sectors

Technology

Pro Insight

πŸ”’ Pro insight: The exploitation of this vulnerability highlights the need for rigorous patch management and user education to prevent unauthorized access.

Sources

Original Report

EDExploit-DB
Read Original

Related Pings

HIGHVulnerabilities

ActiveMQ Vulnerability - 13-Year-Old RCE Flaw Discovered

A serious RCE vulnerability in Apache ActiveMQ has been discovered, allowing hackers to execute commands. This flaw has gone undetected for 13 years, affecting many organizations. Immediate action is needed to patch vulnerable systems.

BleepingComputerΒ·
HIGHVulnerabilities

CVE-2026-1340 - New Ivanti Endpoint Manager Vulnerability Alert

CISA has added a new vulnerability to its KEV Catalog, affecting Ivanti Endpoint Manager Mobile. This code injection flaw poses serious risks, especially to federal agencies. Organizations are urged to act swiftly to mitigate exposure.

CISA AdvisoriesΒ·
HIGHVulnerabilities

Outdated Software - Major Security Risks for Macs & Mobile

Research shows outdated software on Macs and mobile devices poses significant security risks. Over half of organizations are affected, risking sensitive data. Keeping systems updated is vital for security.

SC MediaΒ·
HIGHVulnerabilities

XiboCMS 3.3.4 - Critical Remote Code Execution Flaw

A critical flaw in XiboCMS 3.3.4 allows attackers to execute arbitrary code. This vulnerability puts user data at risk and requires immediate action to mitigate. Upgrade your systems now to stay safe.

Exploit-DBΒ·
HIGHVulnerabilities

7-Zip 24.00 - Critical Directory Traversal Vulnerability

A critical flaw in 7-Zip 24.00 allows attackers to execute harmful code remotely. Users must upgrade to version 25.00 to avoid exploitation. Don't risk your system's security!

Exploit-DBΒ·
CRITICALVulnerabilities

IBM Identity and Verify Access Vulnerabilities Exposed

IBM has disclosed critical vulnerabilities in its Verify Identity Access products. If unpatched, these flaws could allow attackers to access sensitive data. Organizations must act fast to secure their systems.

Cyber Security NewsΒ·