Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21274: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21274cvecve-2025-21274cwe-59
Published: Tue Jan 14 2025 (01/14/2025, 18:04:30 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Event Tracing Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:11:33 UTC

Technical Analysis

CVE-2025-21274 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') found in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw exists in the Windows Event Tracing subsystem, which is responsible for logging and diagnostic event data. Improper handling of symbolic links or junction points before accessing files can allow an attacker with local privileges to manipulate the file path resolution process. This manipulation can lead to a denial of service condition by causing the event tracing service or related components to crash or become unresponsive. The vulnerability has a CVSS v3.1 base score of 5.5, indicating medium severity. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N). The attack complexity is low (AC:L), meaning exploitation does not require special conditions beyond local access. The impact affects availability (A:H) but not confidentiality or integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of this analysis. The vulnerability was reserved in December 2024 and published in January 2025. This issue is particularly relevant for systems still running the original Windows 10 release (1507), which is largely out of support and may lack modern security mitigations. Exploiting this vulnerability could disrupt event logging and diagnostics, potentially impacting system monitoring and incident response capabilities.

Potential Impact

For European organizations, the primary impact of CVE-2025-21274 is on system availability and operational continuity. Event Tracing is critical for monitoring system health, performance, and security events; disruption can hinder incident detection and response. Organizations relying on legacy Windows 10 Version 1507 systems—often found in industrial control systems, embedded devices, or legacy enterprise environments—are at higher risk. A successful denial of service could cause service outages, loss of audit trail data, and increased downtime, affecting business operations and compliance with regulatory requirements such as GDPR that mandate proper logging. While the vulnerability does not allow data theft or system compromise directly, the loss of event tracing functionality can indirectly increase risk by obscuring attack detection. European sectors with critical infrastructure, manufacturing, healthcare, and government agencies using outdated Windows versions may experience operational disruptions. The lack of known exploits reduces immediate risk, but the absence of patches and the presence of local privilege requirements mean insider threats or attackers with initial access could leverage this vulnerability to degrade system reliability.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1507 is out of mainstream support and unlikely to receive security updates. 2. Restrict local access to systems running this version to trusted users only, minimizing the risk of local exploitation. 3. Implement strict access controls and monitoring on event tracing services and related system components to detect abnormal behavior or crashes. 4. Employ application whitelisting and endpoint protection solutions to prevent unauthorized code execution or privilege escalation that could facilitate exploitation. 5. Regularly audit and inventory systems to identify any running legacy Windows 10 versions and prioritize their upgrade or isolation. 6. Develop incident response plans that account for potential event tracing disruptions to maintain visibility during attacks. 7. If upgrading is not immediately feasible, consider disabling unnecessary event tracing providers or services to reduce the attack surface, while balancing operational needs. 8. Monitor vendor advisories for patches or workarounds and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4f9ed239a66badeb1d

Added to database: 9/9/2025, 11:50:39 PM

Last enriched: 2/14/2026, 8:11:33 AM

Last updated: 3/26/2026, 10:25:16 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses