CVE-2024-26185: CWE-73: External Control of File Name or Path in Microsoft Windows 11 version 22H2
Windows Compressed Folder Tampering Vulnerability
AI Analysis
Technical Summary
CVE-2024-26185 is a vulnerability identified in Microsoft Windows 11 version 22H2 (build 10.0.22621.0) related to the external control of file name or path, classified under CWE-73. This vulnerability specifically affects the handling of compressed folders (ZIP files) within the Windows operating system. An attacker can craft a malicious compressed folder that, when opened by a user, can manipulate the file paths or names during extraction or viewing. This external control over file paths can lead to unauthorized modification of files on the victim's system, resulting in integrity violations. The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R), such as opening or interacting with a malicious compressed folder. The attack vector is network-based (AV:N), meaning the malicious archive can be delivered via email, download, or other network means. The scope is unchanged (S:U), indicating the impact is limited to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 6.5, categorized as medium severity. The impact is primarily on integrity (I:H), with no direct confidentiality or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to overwrite or tamper with files by controlling the extraction paths, potentially leading to privilege escalation or disruption of system or application behavior if critical files are modified. However, exploitation requires user action to open the malicious archive, limiting automated exploitation. The vulnerability is significant given the widespread use of Windows 11 22H2 and the common use of compressed folders for file transfer and storage.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of systems running Windows 11 version 22H2. Attackers could leverage this flaw to modify or replace critical files, potentially disrupting business operations or enabling further attacks such as persistence or privilege escalation. Sectors with high reliance on Windows 11, such as finance, healthcare, and government, could face targeted attempts to exploit this vulnerability, especially through phishing campaigns delivering malicious compressed folders. The requirement for user interaction means that social engineering remains a key factor in successful exploitation. While confidentiality and availability impacts are not directly indicated, the integrity compromise could indirectly affect availability if system files are tampered with. Given the lack of known exploits in the wild, immediate widespread impact is unlikely, but the vulnerability should be addressed promptly to prevent future exploitation. Organizations with extensive remote workforces or high email traffic are particularly at risk due to increased exposure to network-delivered malicious archives.
Mitigation Recommendations
Implement strict email filtering and attachment scanning to detect and block malicious compressed folders before reaching end users. Educate users to avoid opening compressed folders from untrusted or unexpected sources, emphasizing the risk of file path manipulation. Use endpoint protection solutions capable of detecting anomalous file extraction behaviors or unauthorized file modifications. Apply application whitelisting to restrict execution or modification of critical system files, limiting the impact of tampering. Monitor file system integrity on critical endpoints to detect unauthorized changes promptly. Deploy network segmentation to limit the spread of potential attacks originating from compromised systems. Stay alert for official Microsoft patches or updates addressing this vulnerability and prioritize their deployment once available. Leverage Windows Defender Exploit Guard or similar features to harden the system against exploitation vectors involving compressed files.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2024-26185: CWE-73: External Control of File Name or Path in Microsoft Windows 11 version 22H2
Description
Windows Compressed Folder Tampering Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-26185 is a vulnerability identified in Microsoft Windows 11 version 22H2 (build 10.0.22621.0) related to the external control of file name or path, classified under CWE-73. This vulnerability specifically affects the handling of compressed folders (ZIP files) within the Windows operating system. An attacker can craft a malicious compressed folder that, when opened by a user, can manipulate the file paths or names during extraction or viewing. This external control over file paths can lead to unauthorized modification of files on the victim's system, resulting in integrity violations. The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R), such as opening or interacting with a malicious compressed folder. The attack vector is network-based (AV:N), meaning the malicious archive can be delivered via email, download, or other network means. The scope is unchanged (S:U), indicating the impact is limited to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 6.5, categorized as medium severity. The impact is primarily on integrity (I:H), with no direct confidentiality or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to overwrite or tamper with files by controlling the extraction paths, potentially leading to privilege escalation or disruption of system or application behavior if critical files are modified. However, exploitation requires user action to open the malicious archive, limiting automated exploitation. The vulnerability is significant given the widespread use of Windows 11 22H2 and the common use of compressed folders for file transfer and storage.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of systems running Windows 11 version 22H2. Attackers could leverage this flaw to modify or replace critical files, potentially disrupting business operations or enabling further attacks such as persistence or privilege escalation. Sectors with high reliance on Windows 11, such as finance, healthcare, and government, could face targeted attempts to exploit this vulnerability, especially through phishing campaigns delivering malicious compressed folders. The requirement for user interaction means that social engineering remains a key factor in successful exploitation. While confidentiality and availability impacts are not directly indicated, the integrity compromise could indirectly affect availability if system files are tampered with. Given the lack of known exploits in the wild, immediate widespread impact is unlikely, but the vulnerability should be addressed promptly to prevent future exploitation. Organizations with extensive remote workforces or high email traffic are particularly at risk due to increased exposure to network-delivered malicious archives.
Mitigation Recommendations
Implement strict email filtering and attachment scanning to detect and block malicious compressed folders before reaching end users. Educate users to avoid opening compressed folders from untrusted or unexpected sources, emphasizing the risk of file path manipulation. Use endpoint protection solutions capable of detecting anomalous file extraction behaviors or unauthorized file modifications. Apply application whitelisting to restrict execution or modification of critical system files, limiting the impact of tampering. Monitor file system integrity on critical endpoints to detect unauthorized changes promptly. Deploy network segmentation to limit the spread of potential attacks originating from compromised systems. Stay alert for official Microsoft patches or updates addressing this vulnerability and prioritize their deployment once available. Leverage Windows Defender Exploit Guard or similar features to harden the system against exploitation vectors involving compressed files.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-02-14T22:23:54.099Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9836c4522896dcbeafea
Added to database: 5/21/2025, 9:09:10 AM
Last enriched: 6/26/2025, 6:43:45 AM
Last updated: 10/16/2025, 12:44:21 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.