Positive Technologies Helped Fix a Vulnerability in Windows

Positive Technologies Helped Fix a Vulnerability in Windows

A critical Windows vulnerability affecting dozens of Microsoft products has been patched with help from Positive Technologies’ research team. The flaw—tracked as CVE-2025-47955 and rated 7.8 on the CVSS scale—was discovered by Sergey Bliznyuk, a specialist with the PT SWARM vulnerability research unit.

Vulnerability Overview

CVE-2025-47955 impacted 37 Microsoft products, including current desktop and server editions of Windows. The vulnerability enabled local privilege escalation, allowing attackers to gain System-level access and potentially pivot deeper into a compromised network.

The flaw was found in Remote Access Connection Manager (RasMan), a core Windows service used for managing VPN connections. Successful exploitation would let an attacker execute arbitrary code, install unauthorized software, or deploy malware.

Affects Windows 10, 11, and 19 Server Editions

The vulnerability spans a wide range of Windows systems:

  • Windows 10 and Windows 11
  • 19 versions of Windows Server, including Windows Server 2025 and 2022

Bliznyuk noted the widespread use of these systems in enterprise environments:

"This vulnerability is particularly dangerous for corporate networks. If the patch is not applied, an attacker would only need access to an employee’s non-administrator computer or a low-privilege terminal server to gain maximum privileges on it,"
Sergey Bliznyuk, Senior Penetration Testing Specialist, Positive Technologies

These systems are commonly deployed in corporate IT, cloud infrastructure, and data center environments, making the risk especially significant.

Mitigation and Recommendations

Microsoft has addressed the issue through its monthly security updates. Users and system administrators are urged to install the latest patches immediately.

If patching is not feasible—due to legacy systems or change management constraints—experts strongly recommend disabling the Remote Access Connection Manager service, which is enabled by default in all affected operating systems.


This case highlights the critical role of independent security researchers in identifying and mitigating threats before they are exploited. Positive Technologies’ contribution helped close a serious gap in one of the world’s most widely used operating systems—before it could be weaponized at scale.

Read more