Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges

Posted on September 10, 2025September 10, 2025 By CWS

Microsoft has issued an up to date warning for a essential safety vulnerability in Energetic Listing Area Providers, tracked as CVE-2025-21293.

This flaw may allow an attacker who has already gained preliminary entry to a system to escalate their privileges, doubtlessly gaining full management over the affected area controller and undermining the safety of the community infrastructure.

The vulnerability is categorized as an “Elevation of Privilege” situation stemming from an improper entry management weak spot, formally recognized as CWE-284.

In accordance with Microsoft’s advisory, an attacker who efficiently exploits this flaw may elevate their privileges to the SYSTEM stage.

Gaining SYSTEM privileges is the very best stage of entry on a Home windows system, permitting an attacker to carry out any motion with out restriction.

This contains putting in malicious software program, modifying or deleting essential information, and creating new administrative accounts, which may very well be used to determine persistence throughout the community.

The vulnerability was initially reported on January 14, 2025, with Microsoft offering an replace on September 9, 2025, to supply additional readability.

Exploit Circumstances And Evaluation

Microsoft has assessed the exploitability of this vulnerability as “Exploitation Much less Doubtless.” A key issue on this evaluation is the assault vector, which requires an attacker to first go online to the goal system.

This implies the flaw can’t be exploited remotely by an unauthenticated person. The adversary should possess legitimate credentials, which may very well be obtained via ways like phishing, credential stuffing, or exploiting a separate vulnerability.

As soon as authenticated, the attacker would wish to run a specifically crafted utility to set off the flaw and escalate their privileges.

On the time of the newest replace, the vulnerability had not been publicly disclosed, and there have been no stories of it being actively exploited within the wild.

Regardless of the prerequisite of prior entry, the severity of the potential impression makes patching a essential precedence for IT directors.

An attacker with SYSTEM-level management on a site controller can compromise all the Energetic Listing forest, placing all domain-joined sources in danger.

Organizations are strongly suggested to use the safety updates launched by Microsoft to guard their area controllers from this risk.

This incident serves as a reminder {that a} defense-in-depth safety technique, which incorporates common patching, community segmentation, and monitoring for anomalous person exercise, is important to defend in opposition to multi-stage assaults that leverage native privilege escalation vulnerabilities.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Active, Attackers, Directory, Domain, Escalate, Microsoft, Privileges, Services, Vulnerability, Warns

Post navigation

Previous Post: China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations
Next Post: Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety

Related Posts

HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance Cyber Security News
How to Enrich Alerts with Live Attack Data from 15K SOCs  Cyber Security News
Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News
Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer Cyber Security News
Top 10 Best Web Application Penetration Testing Companies in 2025 Cyber Security News
PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability
  • SimSpace Raises $39 Million for Cyber Range Platform
  • Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware
  • Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System
  • Sublime Security Raises $150 Million for Email Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability
  • SimSpace Raises $39 Million for Cyber Range Platform
  • Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware
  • Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System
  • Sublime Security Raises $150 Million for Email Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News