Headline
CVE-2025-26647: Windows Kerberos Elevation of Privilege Vulnerability
How could an attacker exploit this vulnerability?
An authenticated attacker could exploit this vulnerability by establishing a machine-in-the-middle (MITM) attack or other local network spoofing technique, then sending a malicious Kerberos message to the client victim machine to spoof itself as the Kerberos authentication server.