Jun 16, 2025, 12:00 AM
Jun 16, 2025, 12:00 AM

Microsoft confirms urgent Windows vulnerability leading to system takeover

Highlights
  • Microsoft has warned users about a serious security vulnerability in Windows, classified as CVE-2025-33073.
  • This vulnerability poses significant risks as it can allow attackers to gain system privileges through an authentication relay attack.
  • Users are strongly advised to update their systems immediately to prevent potential exploitation.
Story

In recent months, Microsoft has issued a series of warnings regarding critical vulnerabilities in its Windows operating system, particularly affecting Windows 10 and 11 users. One significant vulnerability, identified as CVE-2025-33073, was announced and is categorized as a high-severity risk with a Common Vulnerability Scoring System score of 8.8. This specific security flaw allows attackers to gain SYSTEM privileges through an authentication relay attack. Currently, no exploits have been reported, but given the public availability of details about this vulnerability, experts anticipate that it is only a matter of time before cybercriminals attempt to exploit it. Microsoft has responded to the threat by releasing a fix as part of its June Patch Tuesday security update, which addresses this vulnerability and enhances security measures related to SMB signing and Kerberos authentication. Users have been advised to update their systems immediately to protect against potential exploitation. In addition to responding to vulnerabilities, Microsoft is also promoting a new migration feature to help users upgrade from Windows 10 to Windows 11. This feature includes a 'PC to PC' transfer option, enabling smoother transitions for those unable to upgrade due to hardware limitations. With the gradual phase-out of Windows 10 support, the tech giant aims to encourage users to migrate to Windows 11 and take advantage of enhanced security and features. However, this push comes alongside warnings that existing vulnerabilities must be addressed to avoid significant risks to user systems and data integrity.

Opinions

You've reached the end