Home Microsoft CVE-2025-60718
Back to Microsoft

CVE-2025-60718

Windows - Administrator Protection

Microsoft CVSS 7.8 Updated March 13, 2026

Executive Risk Summary

"An authorized attacker can exploit an untrusted search path vulnerability in Windows Administrator Protection to elevate privileges locally, potentially gaining unauthorized access to sensitive system resources. This vulnerability poses a significant risk to system security and integrity, as it could be leveraged to execute malicious code or modify system settings."

Operational Audit Arsenal

Target Type Executable
Target Asset Windows Administrator Protection executable
Standard Path %windir%\System32
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Windows Administrator Protection executable (Executable)
$Targets = 'Windows Administrator Protection executable'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

System administration services

Internal Work Notes

CVE-2025-60718: Local privilege escalation vulnerability in Windows Administrator Protection, requiring patching to prevent unauthorized access and potential system compromise.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.