Skip to main content

CVE-2025-21274: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-21274cvecve-2025-21274cwe-59
Published: Tue Jan 14 2025 (01/14/2025, 18:04:30 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Event Tracing Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:21:47 UTC

Technical Analysis

CVE-2025-21274 is a medium-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is classified under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following'. This vulnerability specifically impacts the Windows Event Tracing component, allowing an attacker with limited privileges (local access with low complexity) to cause a denial of service (DoS) condition. The vulnerability arises because the system improperly resolves symbolic links or junction points before accessing files, which can be exploited to redirect file operations to unintended locations. This can lead to resource exhaustion or system instability, effectively disrupting event tracing services and potentially impacting system monitoring and diagnostics. The CVSS 3.1 base score is 5.5 (medium), reflecting that the attack vector is local (AV:L), requires low privileges (PR:L), no user interaction (UI:N), and results in high impact on availability (A:H) but no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or mitigation links are provided yet, indicating that organizations should proactively prepare for remediation once available.

Potential Impact

For European organizations, this vulnerability could disrupt critical system monitoring and event logging capabilities on affected Windows 10 Version 1809 systems. Event tracing is essential for security auditing, performance monitoring, and troubleshooting; its disruption could delay detection of other security incidents or operational issues. Organizations relying on legacy Windows 10 1809 installations, especially in industrial, healthcare, or government sectors where stability and monitoring are paramount, may experience operational downtime or degraded incident response capabilities. Although the vulnerability does not allow privilege escalation or data compromise directly, the denial of service could be leveraged as part of a multi-stage attack or to cover tracks during an intrusion. Given that Windows 10 1809 is an older version, some organizations may still use it due to legacy application dependencies, increasing their exposure risk.

Mitigation Recommendations

European organizations should immediately inventory their environments to identify systems running Windows 10 Version 1809 (build 17763.0). Since no patch links are currently available, organizations should implement compensating controls such as restricting local user privileges to minimize the risk of exploitation. Limiting access to systems and enforcing strict user account control policies can reduce the attack surface. Monitoring for unusual event tracing failures or system instability may provide early indicators of attempted exploitation. Organizations should plan to upgrade affected systems to a supported and patched Windows version as soon as updates are released. Additionally, applying application whitelisting and endpoint detection and response (EDR) solutions can help detect and prevent exploitation attempts. Network segmentation to isolate legacy systems and enhanced logging of local user activities can further mitigate risk until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4f9ed239a66badeb1d

Added to database: 9/9/2025, 11:50:39 PM

Last enriched: 9/10/2025, 1:21:47 AM

Last updated: 9/10/2025, 5:17:50 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats