CVE-2025-33073

Microsoft Windows — Microsoft Windows SMB Client Improper Access Control Vulnerability
⚠️ CVSS 3.1  8.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.

https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33073 ; https://nvd.nist.gov/vuln/detail/CVE-2025-33073

Key Details

PropertyValue
CVE ID CVE-2025-33073
Vendor / Product Microsoft — Windows
NVD Published2025-06-10
NVD Last Modified2025-10-27
CVSS 3.1 Score8.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-284
CISA KEV Added2025-10-20
CISA KEV Deadline2025-11-10
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2025-11-10. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2025-10-20Added to CISA Known Exploited Vulnerabilities catalog
2025-11-10CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2025-33073 Vulnerability Database
CISA KEV Catalog Entry US Government