Cyber Posture

CVE-2025-63945

HighPublic PoC

Published: 23 February 2026

Published
23 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 10.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-63945 is a high-severity Link Following (CWE-59) vulnerability in Tencent Ioa. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 10.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local privilege escalation via exploitation of a race condition (CWE-59) in a Windows application directly enables T1068.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A privilege escalation (PE) vulnerability in the Tencent iOA app thru 210.9.28693.621001 on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race condition.

Deeper analysisAI

CVE-2025-63945 is a privilege escalation vulnerability in the Tencent iOA application through version 210.9.28693.621001 on Windows devices. Published on 2026-02-23, it is classified under CWE-59 (Improper Link Resolution Before File Access) and carries a CVSS v3.1 base score of 7.4 (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The flaw enables a local user to execute arbitrary programs with elevated privileges, but successful exploitation hinges on reliably triggering an underlying race condition.

A local attacker requires physical or logical access to the target Windows system but no prior privileges (PR:N). Exploitation demands high complexity (AC:H) due to the race condition, with no user interaction needed (UI:N). If successful, the attacker can execute code at elevated privilege levels, resulting in high impacts to confidentiality, integrity, and availability.

Proof-of-concept exploit code is publicly available in GitHub repositories at https://github.com/alexlee820/CVE-2025-63945-Tencent-iOA-EoP and https://github.com/alexlee820/Tencent-iOA-EoP. No official advisories or patches are detailed in the provided information.

Details

CWE(s)

Affected Products

tencent
ioa
≤ 210.9.28693.62001

CVEs Like This One

CVE-2025-63946Same vendor: Tencent
CVE-2026-31979Shared CWE-59
CVE-2025-60710Shared CWE-59
CVE-2026-25906Shared CWE-59
CVE-2025-41667Shared CWE-59
CVE-2026-20610Shared CWE-59
CVE-2025-43257Shared CWE-59
CVE-2025-21322Shared CWE-59
CVE-2025-21331Shared CWE-59
CVE-2025-29795Shared CWE-59

References