Skip to main content
CVE-2025-26633 High Patch Available

CVE-2025-26633: Microsoft MMC — Zero-Day Security Feature Bypass

CVE Details

CVE ID CVE-2025-26633
CVSS Score 7
Severity High
Vendor Microsoft
Product Microsoft Management Console
Patch Status Available
Published March 11, 2025
EPSS Score 45.3%
CISA Patch Deadline ⚠ April 1, 2025 Federal deadline passed

Background

Microsoft Management Console (MMC) is the host for Windows administrative snap-ins — things like Event Viewer, Device Manager, Group Policy Editor, and hundreds of third-party management tools. MMC files (.msc) are executable in the sense that opening them runs the snap-in they reference, and malicious .msc files have been used as attack vectors historically.

CVE-2025-26633 was patched in March 2025 and confirmed as actively exploited before the patch. Trend Micro researchers attributed exploitation to EncryptHub (also tracked as LARVA-208 and Water Gamayun), a threat actor associated with multi-stage malware delivery. The bypass is specifically designed to evade Windows security features that would normally warn users about potentially dangerous files.

Technical Mechanism

When MMC opens a .msc file, Windows applies security checks — including SmartScreen or related Mark of the Web (MotW) checks — to determine whether to warn the user. CVE-2025-26633 exploits a flaw in how MMC handles certain .msc file structures or associated metadata that bypasses these security checks.

The bypass works through a crafted .msc file that manipulates the way MMC resolves custom snap-in paths or resources:

  1. A malicious .msc file is crafted to reference a custom or specially constructed MMC snap-in
  2. When the file is processed by MMC, the security check that should flag the file as potentially dangerous is bypassed
  3. MMC proceeds to execute the referenced snap-in or payload without displaying a warning
  4. The payload — in EncryptHub’s case, typically a downloader for further malware — executes

The exploit path bypasses user-facing security warnings, so users see nothing unusual. The .msc file may even look like a legitimate management tool.

Real-World Exploitation Evidence

Trend Micro’s research on EncryptHub campaigns identified this zero-day:

  • EncryptHub (LARVA-208 / Water Gamayun) — a financially motivated threat actor using sophisticated phishing campaigns and living-off-the-land techniques
  • Multi-stage malware delivery — the MMC bypass was used to deliver a downloader, which then retrieved secondary payloads including remote access trojans and information stealers
  • Phishing delivery — malicious .msc files delivered via phishing emails, sometimes disguised as legitimate management tools
  • EncryptHub Stealer — the actor’s custom information stealer, harvesting credentials and browser data
  • Rhadamanthys / SilentPrism — additional payloads observed in EncryptHub campaigns leveraging this vulnerability

The targeting was broad — not narrowly focused, suggesting the exploit was being used for opportunistic access across multiple target types.

Impact Assessment

  • Malware execution without security warning — users see no SmartScreen/security warning
  • Credential theft — EncryptHub Stealer and Rhadamanthys harvest stored credentials, cookies, and crypto wallet data
  • Remote access — RAT payloads maintain persistent access to compromised systems
  • Supply chain potential — if a threat actor can compromise an admin who regularly uses .msc files, the impact is significantly elevated
  • Trusted file type abuse.msc files are used by IT administrators; blocking them broadly is often not feasible in managed enterprise environments

Affected Versions

ProductAffected VersionsFixed Version
Windows 10 (21H2, 22H2)Before March 2025 patchesKB5053606
Windows 11 (22H2, 23H2, 24H2)Before March 2025 patchesKB5053602, KB5053603
Windows Server 2019Before March 2025 patchesKB5053596
Windows Server 2022Before March 2025 patchesKB5053622
Windows Server 2025Before March 2025 patchesKB5053598

Remediation Steps

  1. Apply March 2025 Patch Tuesday updates
  2. If .msc files are received via email or downloaded from the internet, configure email gateway to quarantine them:
    • .msc files have very limited legitimate use in email attachments
  3. Deploy AppLocker or WDAC rules to restrict MMC to loading only approved snap-ins:
    # AppLocker publisher rule for legitimate MMC snap-ins
    # Block unsigned or non-whitelisted .msc files from running
  4. Monitor for EncryptHub IOCs on endpoints:
    • Check threat intel feeds for current EncryptHub infrastructure hashes and IPs
  5. Enable PowerShell script block logging and AMSI logging to detect post-exploitation activity

Detection Guidance

File monitoring — alert on .msc files:

  • Downloaded from the internet (MotW tagged)
  • Received as email attachments
  • Located in unusual directories (temp, downloads, user profile)

Process monitoring — look for mmc.exe executing with unusual parameters or spawning unexpected child processes:

process_name = "mmc.exe" AND (
  child_process_name IN ("cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe") OR
  parent_process_name NOT IN ("explorer.exe", "mmc.exe")
)

Windows Event Logs:

  • Event ID 4688: Process creation with mmc.exe as parent to unexpected children
  • AppLocker events if block rules are in place

Suricata signature:

alert http any any -> any any (msg:"Possible EncryptHub/CVE-2025-26633 Payload Delivery"; flow:established,from_server; file.data; content:"MZ"; offset:0; depth:2; file.name; content:".msc"; endswith; classtype:web-application-attack; sid:2034024; rev:1;)

Timeline

DateEvent
2025 (pre-patch)EncryptHub exploits CVE-2025-26633 as zero-day
March 2025Trend Micro discovers active exploitation and reports to Microsoft
11 March 2025Microsoft patches CVE-2025-26633 in March Patch Tuesday
March 2025CISA adds to Known Exploited Vulnerabilities catalogue
March 2025Trend Micro publishes analysis of EncryptHub campaigns