Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21347: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-21347cvecve-2025-21347cwe-59
Published: Tue Feb 11 2025 (02/11/2025, 17:58:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Deployment Services Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:43:25 UTC

Technical Analysis

CVE-2025-21347 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0), specifically within Windows Deployment Services (WDS). The vulnerability is classified under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following.' This flaw allows an attacker with low-level privileges and local access to exploit the way WDS resolves symbolic links or shortcuts before accessing files. Due to improper validation, an attacker can manipulate link targets to cause the system to access unintended files or directories, potentially leading to denial of service (DoS) by corrupting or disrupting deployment processes. The CVSS 3.1 base score is 6.0 (medium severity), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The impact affects system integrity and availability, as the attacker can disrupt deployment services, but confidentiality is not compromised. No known exploits are reported in the wild, and no patches have been linked yet, indicating this is a recently published vulnerability. Given that Windows 10 Version 1507 is an early release, it is likely present in legacy or specialized environments rather than broadly in modern enterprise setups.

Potential Impact

For European organizations, the primary impact of CVE-2025-21347 is the potential disruption of Windows Deployment Services, which can halt or corrupt automated OS deployment and imaging processes. This can delay system provisioning, updates, or recovery operations, impacting business continuity and operational efficiency. Organizations relying on legacy Windows 10 Version 1507 in critical infrastructure or specialized environments (e.g., manufacturing, healthcare, or government agencies) may face increased risk. Although the vulnerability does not expose sensitive data, the denial of service could lead to downtime or degraded service availability. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints could leverage this vulnerability. European entities with strict uptime and compliance requirements should consider the operational risks associated with disrupted deployment services.

Mitigation Recommendations

1. Upgrade or patch: Since no official patch links are provided yet, organizations should monitor Microsoft security advisories closely and apply patches as soon as they become available. 2. Upgrade Windows: Consider upgrading systems from Windows 10 Version 1507 to a supported, modern Windows version to eliminate exposure to this legacy vulnerability. 3. Restrict local access: Limit local user access to systems running Windows Deployment Services, enforcing least privilege principles and strong access controls. 4. Monitor deployment services: Implement logging and monitoring on WDS to detect unusual link resolution activities or file access patterns indicative of exploitation attempts. 5. User training: Educate users about the risks of interacting with suspicious prompts or links that could trigger the vulnerability. 6. Network segmentation: Isolate deployment servers from general user networks to reduce the risk of local exploitation. 7. Incident response readiness: Prepare to respond to potential denial of service incidents impacting deployment infrastructure to minimize downtime.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.353Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f00058703ef3fc98011

Added to database: 12/17/2025, 10:30:24 PM

Last enriched: 2/14/2026, 8:43:25 AM

Last updated: 3/23/2026, 4:58:26 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses