CVE-2025-41761
Microsoft · Windows (UBR Service)
A local attacker with low privileges can exploit the UBR service account to potentially escalate privileges or access sensitive system data within the Windows environment.
Executive summary
A high-severity vulnerability in the Windows UBR service account allows low-privileged local attackers to gain unauthorized access, potentially leading to full system compromise.
Vulnerability
This is a privilege escalation vulnerability where a low-privileged local attacker gains unauthorized access to the UBR (Unified Background Registry) service account. By leveraging this access, the attacker can bypass standard security boundaries to perform actions with the elevated permissions assigned to the service.
Business impact
Successful exploitation of this vulnerability could allow an attacker to move laterally within a system or escalate their privileges to a level that permits data exfiltration or the installation of persistent malware. With a CVSS score of 7.8, the risk is classified as High, as it directly undermines the integrity of the operating system's security model. Organizations face potential data breaches and loss of control over affected local assets.
Remediation
Immediate Action: Apply the latest security updates provided by Microsoft to patch the UBR service account logic and restrict unauthorized access.
Proactive Monitoring: Review system audit logs for unusual activity associated with the UBR service account and monitor for unexpected local privilege changes.
Compensating Controls: Implement strict Endpoint Detection and Response (EDR) policies to detect and block suspicious local process injections or account switching.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a significant risk to the local security posture of Windows-based environments. It is highly recommended that administrators prioritize the deployment of the vendor's security patch immediately. Ensuring that the principle of least privilege is enforced across all service accounts will further mitigate the potential impact of such privilege escalation flaws.