Vulnerabilities & CVEs

Windows 11 Admin Protection Bypassed in 9 Ways

Imagine clicking a seemingly harmless app, only for it to quietly seize total control of your PC. That's the nightmare Windows 11's Administrator Protection aimed to end—until researchers found nine ways around it.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
Windows 11 Administrator Protection bypass code on a cracked shield graphic

Key Takeaways

  • Windows 11 25H2's Administrator Protection shipped with 9 silent admin bypasses, all now patched by Microsoft.
  • Feature uses shadow admin accounts to fix UAC's shared-profile flaws, but implementation left attack hooks.
  • Echoes historical Windows elevation bugs; expect more bypasses as researchers probe.

Your next software update could hand attackers the keys to your machine. Windows 11’s Administrator Protection, rolled out in the 25H2 release, promised to bury User Account Control’s (UAC) long history of silent bypasses. Instead, it debuted with nine vulnerabilities that let limited users snag full admin privileges without a whisper.

A single researcher uncovered them all during insider previews. Microsoft patched every one—some before launch via KB5067036, others in follow-ups. But the episode exposes a raw truth: even ‘strong’ redesigns carry fresh attack surfaces, especially when you’re betting on them to shield everyday users from malware’s privilege grabs.

What Does Windows Administrator Protection Actually Do?

UAC, born in Vista, split admin accounts into limited and elevated tokens sharing the same profile—recipe for abuse. Attackers exploited shared registry hives, impersonated tokens, and hijacked auto-elevating binaries from Windows 7 onward. Tools like UACMe catalog 81 techniques, many still live on latest Windows 11.

Administrator Protection flips to a shadow admin account model, mimicking ‘over-the-shoulder’ elevation (used for non-admin users). No more shared profiles. No token impersonation across accounts. No auto-elevation. Enter credentials? Not quite—it auto-provisions a hidden admin, aiming for smoothly security without password hassles.

“The main issue with the design of UAC was that both the limited user and the administrator user were the same account just with different sets of groups and privileges. This meant they shared profile resources such as the user directory and registry hive.”

That’s the researcher’s crisp diagnosis. Smart move, right? Except implementation lagged.

Brutal reality. Nine bypasses. Each silent, each elevating without prompts.

How Did a Researcher Crack Nine Bypasses?

The hunt started in insider builds. Researcher probed the shadow account setup—auto-created by UAC services, tied to the primary user but isolated. Key shift: elevations now demand this shadow token, enforcing stricter checks.

But cracks appeared fast. One path repurposed trusted binaries, echoing UAC’s auto-elevation sins. Others manipulated service permissions or registry paths the feature overlooked. Details stay high-level here (full tech deep-dive in the original post), but the ‘how’ hinged on incomplete isolation: shadow account creation left hooks for limited processes to inject or impersonate before full lockdown.

Microsoft’s response? Swift fixes. Yet here’s the unique insight absent from the source: this mirrors the Wininit flaw cascade of 2009. Back then, early Windows 7 auto-elevation let sandboxed apps claw to kernel via session-0 exploits. Microsoft patched reactively, but the pattern repeats—rushed ‘secure’ elevation always births bypass families. Prediction: expect UACMe to swell with 25H2 entries by mid-2026, as red teams dissect remnants.

And Microsoft’s PR spin? They tout it as ‘securable,’ downgrading UAC to mere convenience long ago. Fair, but shipping half-baked isolation while hyping robustness? That’s not skepticism; it’s negligence.

Short-term pain for users. As of December 1, 2025, Microsoft disabled the feature over app compatibility woes—unrelated, they insist. Re-enable at your peril until patches land universally.

Why Do UAC Bypasses Still Plague Windows 11?

Malware loves them. Silent escalation turns browser exploits into system takeovers: ransomware encrypts your drives, keyloggers snag enterprise creds. Administrator Protection targeted this—making UAC a ‘hard boundary’ worth defending.

Over-the-shoulder elevation proved the blueprint: separate accounts block profile tampering, nix impersonation, kill auto-elevs. But scaling it sans passwords? Shadow accounts aimed high, stumbled on edge cases like service bootstrapping and path resolution.

Deeper architecture shift: Windows clings to backward compatibility. Binaries from Vista era still auto-elevate under defaults few tweak. Result? 81 UACMe tricks, subset weaponized daily. Administrator Protection could’ve reset the board—instead, it replayed the tape.

Corporate hype alert. Microsoft frames fixes as routine, but disabling the feature pre-launch screams rushed QA. Compare to macOS’s SIP or Linux’s sudo: they enforce boundaries without shadow-account gymnastics. Windows? Still chasing its tail.

Users feel it most. Home setups default to admin accounts—80% of infections per telemetry. Enterprises? Group Policy mitigates, but endpoints lag. This bypass saga means one thing: patch fast, or your next phishing click owns you.

Is Administrator Protection Worth the Hype?

No. Not yet.

It nails the ‘why’—shared-token flaws bred bypasses—but the ‘how’ exposed sloppy edges. Nine vulns signal incomplete modeling of elevation flows. Historical parallel: Vista’s UAC debuted unbreakable in labs, cracked in weeks. Same here.

Bold call: Microsoft will iterate to a hybrid—shadow accounts plus biometric binds (Windows Hello integration?). Until then, stick to ‘always prompt’ UAC, separate standard accounts. Tools like UACMe prove the default’s a sieve.

Developers, audit your binaries. Opt-out auto-elev if unused. Sysadmins, enforce LAPS for shadow creds.

The win? All reported issues fixed. Researcher credits Microsoft responsiveness. But trust rebuilds slow—especially when your ‘more strong’ shield ships porous.

Impact on real people. That pirated app? Now a backdoor. Family PC ransomware? Drains savings. Work laptop? Lateral movement to domain admin. Elevation flaws aren’t abstract; they extract real costs.


🧬 Related Insights

Frequently Asked Questions

What is Windows Administrator Protection?
New 25H2 feature replacing UAC with shadow admin accounts for isolated elevations, blocking silent bypasses via separate profiles and no auto-elevs.

Are there still UAC bypasses on Windows 11?
Yes—81 known via UACMe, many active. Administrator Protection aimed to fix but launched with nine bypasses (now patched).

Should I enable Administrator Protection now?
Wait—it’s disabled as of Dec 2025 for compatibility. Patch fully, then test; defaults remain risky.

Written by
Threat Digest Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

What is Windows Administrator Protection?
New 25H2 feature replacing UAC with shadow admin accounts for isolated elevations, blocking silent bypasses via separate profiles and no auto-elevs.
Are there still UAC bypasses on Windows 11?
Yes—81 known via UACMe, many active. Administrator Protection aimed to fix but launched with nine bypasses (now patched).
Should I enable Administrator Protection now?
Wait—it's disabled as of Dec 2025 for compatibility. Patch fully, then test; defaults remain risky.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Google Project Zero

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.