MSRC compact vulnerability detail

CVE-2025-47986 · Universal Print Management Service Elevation of Privilege Vulnerability

Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.

Severity
Important
Impact
Elevation of Privilege
CVSS
8.8 base · 7.7 temporal
Release
2025-07-08
Signals
Universal Print Management Service Elevation of Privilege Exploited: No Publicly disclosed: No Exploitability: Exploitation Unlikely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.
FAQ / Articles
Universal Print Management Service Elevation of Privilege Vulnerability
Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.
Universal Print Management Service Elevation of Privilege Vulnerability
Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.
FAQ
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information.
Universal Print Management Service Elevation of Privilege Vulnerability
Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.
Universal Print Management Service Elevation of Privilege Vulnerability
Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user.
FAQ
How could an attacker exploit this vulnerability? An authenticated attacker could send a specially crafted file to a shared printer. This could result in arbitrary code execution on the system that is sharing the printer.