Home

Description

Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.

PUBLISHED Reserved 2026-01-29 | Published 2026-03-10 | Updated 2026-03-13 | Assigner microsoft




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

10.0.14393.0 (custom) before 10.0.14393.8957
affected

10.0.17763.0 (custom) before 10.0.17763.8511
affected

10.0.19044.0 (custom) before 10.0.19044.7058
affected

10.0.19045.0 (custom) before 10.0.19045.7058
affected

10.0.22631.0 (custom) before 10.0.22631.6783
affected

10.0.22631.0 (custom) before 10.0.22631.6783
affected

10.0.26100.0 (custom) before 10.0.26100.8037
affected

10.0.26200.0 (custom) before 10.0.26200.8037
affected

10.0.28000.0 (custom) before 10.0.28000.1719
affected

10.0.28000.0 (custom) before 10.0.28000.1719
affected

10.0.14393.0 (custom) before 10.0.14393.8957
affected

10.0.14393.0 (custom) before 10.0.14393.8957
affected

10.0.17763.0 (custom) before 10.0.17763.8511
affected

10.0.17763.0 (custom) before 10.0.17763.8511
affected

10.0.20348.0 (custom) before 10.0.20348.4893
affected

10.0.25398.0 (custom) before 10.0.25398.2207
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25166 (Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability) vendor-advisory patch

cve.org (CVE-2026-25166)

nvd.nist.gov (CVE-2026-25166)

Download JSON