Your IP: 216.73.216.141 - United States (Columbus)

Language: EN

Critical CVE-2025-47955 Vulnerability Found in Windows: What Every User and Business Needs to Know

27.07.2025

VPN Vulnerability Found in Windows
VPN Vulnerability Found in Windows

In information security, there are no small details. Any vulnerability can have serious consequences for both businesses and individual users. Recently, a critical security flaw was identified in Microsoft products. Experts at Positive Technologies discovered a significant defect in the Windows component responsible for remote connections. This issue was assigned the identifier CVE-2025-47955 and affects 37 Microsoft products, including Windows 10, Windows 11, as well as 19 server versions such as Windows Server 2022 and Windows Server 2025.

Where is the vulnerability?

The issue is linked to the system service called Remote Access Connection Manager. This component is enabled by default in all modern Windows versions and manages VPN connections. It plays a particularly important role for corporate networks and remote employees.

What do the experts say?

According to Sergey Bliznyuk, a penetration testing specialist at Positive Technologies, the vulnerability allows an attacker with minimal privileges to escalate them to administrator level. Simply put, even a standard user account could become an entry point for full control over the system.

Why is CVE-2025-47955 a serious threat?

According to the international CVSS 3.1 vulnerability scoring system, this issue received a score of 7.8, indicating a high risk level. Potential consequences of exploiting this vulnerability include:

  • Execution of arbitrary code on the targeted device;
  • Installation of any software, including malware, trojans, and spyware;
  • Lateral movement within corporate networks aimed at attacking servers and databases.

Therefore, this is not a localized issue affecting only a single device, but a threat to the entire organization’s infrastructure. Without updates, an attacker only needs access to an employee’s computer with regular privileges to bypass all security measures.

Which Windows versions are at risk?

The vulnerability affects the following operating system versions:

  • Windows 10 (all supported editions);
  • Windows 11;
  • Windows Server 2016, 2019, 2022, 2025, and other server versions (a total of 19 products).

This means the threat applies to both home users and large enterprises.

How does the attacker exploit the vulnerability?

The exploitation scenario is as follows:

  1. Gain physical or remote access to a device with limited privileges;
  2. Use CVE-2025-47955 to escalate privileges to administrator level;
  3. Run malicious code, install software, and access network resources.

This is especially dangerous for corporate networks, as compromising a single node can lead to a widespread attack.

Recommendations for users and organizations

Microsoft has already released patches to fix this vulnerability. The key advice is to promptly install the latest updates via Windows Update.

If updating immediately is not possible (for example, due to software compatibility issues), experts recommend disabling the Remote Access Connection Manager service. To do so, follow these steps:

  1. Press Win + R, type services.msc, and press Enter;
  2. Find the Remote Access Connection Manager service;
  3. Stop the service and change the startup type to “Disabled.”

This method will limit VPN functionality but significantly reduce the risk of a successful attack.

Why shouldn’t you delay updates?

Once vulnerability details are published, attackers quickly develop exploits. Even if physical access is required, hackers can use social engineering or target remote desktop services.

Regular system updates, strict account management, and applying the principle of least privilege are key protective measures.

How to strengthen your company’s cybersecurity?

  • Use modern antivirus software with up-to-date signature databases;
  • Implement intrusion detection and prevention systems (IDS/IPS);
  • Apply a least-privilege access policy;
  • Encrypt corporate traffic using VPNs;
  • Set up regular data backups.

Conclusion

The CVE-2025-47955 vulnerability serves as a reminder of the importance of timely software updates. Missing even one patch can lead to system compromise, confidential data leaks, and significant financial losses.

Update your devices today — it’s the most effective way to protect personal data and your business.