{"uuid": "726f2ab4-61f3-4f8b-a226-5e6b32827d43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-59230", "type": "seen", "source": "https://t.me/cKure/15820", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code with System privileges.\n\nWhile investigating CVE-2025-59230, the vulnerability that Microsoft addressed in the October 2025 security updates. 0patch security analysts discovered a complex exploit chain that relies on a secondary, previously unknown zero-day flaw to function effectively.\n\nhttps://cybersecuritynews.com/windows-remote-access-connection-manager-vulnerability/", "creation_timestamp": "2025-12-15T12:20:29.000000Z"}