Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-25166

Опубликовано: 10 мар. 2026
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability

Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.

FAQ

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Unlikely

EPSS

Процентиль: 62%
0.00425
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
16 дней назад

Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.

CVSS3: 7.8
github
16 дней назад

Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.

CVSS3: 7.8
fstec
17 дней назад

Уязвимость инструмента System Image Manager (SIM) операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 62%
0.00425
Низкий

7.8 High

CVSS3