CVE-2025-55320: Configuration Manager Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 6.8)
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2025-Oct
Released
2025-10-14
Last Updated
2025-10-17
EPSS Score
0.14% (percentile: 33.3%)

Description

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges over an adjacent network.

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain sysadmin privileges. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by injecting malicious SQL into the SyncToken method, allowing execution of arbitrary queries as the SMS service. According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.

Affected Products (3)

System Center

  • Microsoft Configuration Manager 2503
  • Microsoft Configuration Manager 2403
  • Microsoft Configuration Manager 2409

Security Updates (3)

Acknowledgments

<a href="https://x.com/kalimer0x00">Mehdi Elyassa</a> with <a href="https://www.synacktiv.com/">Synacktiv</a>, <a href="https://x.com/kalimer0x00">Mehdi Elyassa</a> with <a href="https://www.synacktiv.com/">Synacktiv</a>

Revision History

  • 2025-10-14: Information published.
  • 2025-10-17: The score for this vulnerability has been updated to reflect a change in score in the** Attack Vector **metric from Local to Adjacent.