Home Microsoft CVE-2025-4660
Back to Microsoft

CVE-2025-4660

Windows - SecureConnector Agent

Microsoft CVSS 9.8 Updated March 12, 2026

Executive Risk Summary

"A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe, allowing any network-based attacker to connect without authentication. This vulnerability can be exploited to redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent."

Operational Audit Arsenal

Target Type Named Pipe
Target Asset SecureConnector Agent Pipe
Standard Path %windir%\pipe\SecureConnector
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: SecureConnector Agent Pipe (Named Pipe)
$Targets = 'SecureConnector Agent Pipe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

SecureConnector Service

Internal Work Notes

Remote code execution vulnerability in Windows SecureConnector Agent requires patching to prevent unauthorized access and command execution.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.