CVE-2025-53795

Microsoft · Microsoft PC Manager

A critical vulnerability has been identified in Microsoft PC Manager, assigned CVE-2025-53795, with a CVSS score of 9.1.

Executive summary

A critical vulnerability has been identified in Microsoft PC Manager, assigned CVE-2025-53795, with a CVSS score of 9.1. This flaw stems from an improper authorization mechanism that can be exploited by an unauthenticated attacker over a network to gain elevated privileges on a target system. Successful exploitation could lead to a complete system compromise, allowing an attacker to steal data, install malware, or disrupt business operations.

Vulnerability

The vulnerability is an improper authorization flaw within Microsoft PC Manager. The software fails to correctly validate the permissions of a user requesting to perform a sensitive action. An unauthenticated attacker can craft a specific request over the network to bypass these authorization checks, allowing them to execute code with elevated privileges, potentially at the level of the operating system's administrator or SYSTEM account.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.1, posing a significant threat to the organization. A successful exploit could result in a complete system takeover by an unauthorized attacker. This level of access would allow the attacker to install malicious software such as ransomware, exfiltrate sensitive corporate or customer data, disrupt critical services, and use the compromised system as a pivot point to move laterally across the internal network, escalating the breach.

Remediation

Immediate Action: Update Microsoft PC Manager to the latest version as recommended by the vendor. Prioritize patching for all systems where this software is installed, starting with critical and internet-facing assets. After patching, monitor for any signs of exploitation attempts by reviewing system and application access logs for unusual activity.

Proactive Monitoring: Security teams should monitor for unusual network traffic directed at the Microsoft PC Manager service port from untrusted sources. Scrutinize system logs for unexpected processes being spawned by the PC Manager service or the creation of new user accounts with administrative privileges. Configure endpoint detection and response (EDR) solutions to alert on behavior indicative of privilege escalation.

Compensating Controls: If immediate patching is not feasible, restrict network access to the Microsoft PC Manager service. Use host-based firewalls (e.g., Windows Defender Firewall) or network segmentation to limit communication to the service from only trusted IP addresses and subnets. This will reduce the attack surface by mitigating the remote exploitation vector.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.1 and the potential for a complete system compromise via remote privilege escalation, this vulnerability requires immediate attention. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity indicates a high likelihood of future exploitation. Organizations are strongly advised to apply the vendor-supplied patches to all affected systems on an emergency basis to prevent potential compromise.