Home
HIGH: 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C 10.0.14393.0 (custom) before 10.0.14393.8957
affected
10.0.17763.0 (custom) before 10.0.17763.8511
affected
10.0.19044.0 (custom) before 10.0.19044.7058
affected
10.0.19045.0 (custom) before 10.0.19045.7058
affected
10.0.22631.0 (custom) before 10.0.22631.6783
affected
10.0.22631.0 (custom) before 10.0.22631.6783
affected
10.0.26100.0 (custom) before 10.0.26100.8037
affected
10.0.26200.0 (custom) before 10.0.26200.8037
affected
10.0.28000.0 (custom) before 10.0.28000.1719
affected
10.0.28000.0 (custom) before 10.0.28000.1719
affected
10.0.14393.0 (custom) before 10.0.14393.8957
affected
10.0.14393.0 (custom) before 10.0.14393.8957
affected
10.0.17763.0 (custom) before 10.0.17763.8511
affected
10.0.17763.0 (custom) before 10.0.17763.8511
affected
10.0.20348.0 (custom) before 10.0.20348.4893
affected
10.0.25398.0 (custom) before 10.0.25398.2207
affected
Description
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
Problem types
CWE-502: Deserialization of Untrusted Data
Product status
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25166 (Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability)